Sie sind hier: Startseite Forschung Publikationen
Artikelaktionen

Publikationen

Gefiltert nach Autor: Stocker T (Filter löschen)



Originalarbeiten in wissenschaftlichen Fachzeitschriften

Jahre: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994
Icon: top zurück zur Übersicht aller Publikationen

    2013

    Icon: top nach oben zur Jahresübersicht

    Konferenzbeiträge

    Jahre: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986
    Icon: top zurück zur Übersicht aller Publikationen

      2014

      Icon: top nach oben zur Jahresübersicht

      2013

      Icon: top nach oben zur Jahresübersicht
      • Stocker T, Böhr F
        IF-Net: A Meta-Model for Security-Oriented Process Specification
        2013 9th International Workshop, STM 2013, Egham, UK Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, Band: 8203, Seiten: 191 - 206
      • Accorsi R, Stocker T, Mueller G
        On the Exploitation of Process Mining for Security Audits: The Process Discovery Case
        2013 Proceedings of the 28th Annual ACM Symposium on Applied Computing, Seiten: 1462 - 1468
      • Accorsi R, Stocker T
        SecSy: Synthesizing Smart Process Event Logs
        2013 Enterprise Modelling and Information Systems Architectures: Proceedings of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2013, St. Gallen, Switzerland, September 5-6, 2013, Band: 222, Seiten: 71 - 84

      2012

      Icon: top nach oben zur Jahresübersicht
      • Stocker T
        Data Flow-oriented Process Mining to Support Security Audits
        2012 Service-Oriented Computing - ICSOC 2011 Workshops ICSOC Workshops, Band: 7221, Seiten: 171 - 176
      • Accorsi R, Stocker T
        Discovering Workflow Changes with Time-based Trace Clustering
        2012 Post-proceedings of the IFIP Symposium on Data-Driven Process Discovery and Analysis, Seiten: 154 - 168
      • Accorsi R, Stocker T
        On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case
        2012 ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy Proceedings of the 27th Annual ACM Symposium on Applied Computing, Seiten: 1709 - 1716

      2011

      Icon: top nach oben zur Jahresübersicht
      • Stocker T
        Time-based Trace Clustering for Evolution-aware Security Audits
        2011 BPM 2011 International Workshops, Clermont-Ferrand, France Business Process Management Workshops (2), Band: 100, Seiten: 471 - 476
      • Accorsi R, Wonnemann C, Stocker T
        Towards forensic data flow analysis of business process logs
        2011 Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics, Seiten: 3 - 20
      • Accorsi R, Stocker T
        Towards security-aware process mining
        2011 IFIP Symposium on Data-Driven Process Discovery and Analysis

      2009

      Icon: top nach oben zur Jahresübersicht
      • Accorsi R, Stocker T
        On Frameworks for the Visualization of Privacy Policies Implications
        2009 W3C Workshop on Access Control Application Scenarios, Luxemburg W3C Workshop on Access Control Application Scenarios

      2008

      Icon: top nach oben zur Jahresübersicht
      • Accorsi R, Stocker T
        Automated Privacy Audits Based on Pruning of Log Data.
        2008 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, München Proceedings of the 12th Enterprise Distributed Object Computing Conference Workshops, Seiten: 175 - 182
      Benutzerspezifische Werkzeuge