Suriadi Suriadi

Suriadi Suriadi
PSP

About

60
Publications
20,656
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,570
Citations
Citations since 2016
27 Research Items
1282 Citations
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
2016201720182019202020212022050100150200250300
Additional affiliations
July 2016 - present
Queensland University of Technology
Position
  • Senior Researcher

Publications

Publications (60)
Conference Paper
Process mining uses computational techniques for process-oriented data analysis. The use of poor quality input data will lead to unreliable analysis outcomes (garbage in - garbage out), as it does for other types of data analysis. Among the key inputs to process mining analyses are activity labels in event logs which represent tasks that have been...
Chapter
Blockchain technology enables various business transactions to be performed in an immutable and transparent manner. Within the business process management community, blockchain technology has been positioned as a way to better support the execution of inter-organisational business processes, where the entities involved may not completely trust each...
Article
Through the application of Robotic Process Automation (RPA) organisations aim to increase their operational efficiency. In RPA, robots, or ‘bots’ for short, represent software agents capable of interacting with software systems by mimicking user actions, thus alleviating the workload of the human workforce. RPA has already seen significant uptake i...
Chapter
Process mining, as a well-established research area, uses algorithms for process-oriented data analysis. Similar to other types of data analysis, the existence of quality issues in input data will lead to unreliable analysis results (garbage in - garbage out). An important input for process mining is an event log which is a record of events related...
Chapter
The often used notion of ‘best practice’ can be hard to nail down, especially when a process involves multiple stakeholders with conflicting interests, as is common in healthcare, banking, and insurance domains. This exploratory paper presents a novel method that leverages both domain knowledge and historical precedence as recorded in IT systems to...
Chapter
Process mining is, by now, a well-established discipline focussing on process-oriented data analysis. As with other forms of data analysis, the quality and reliability of insights derived through analysis is directly related to the quality of the input (garbage in - garbage out). In the case of process mining, the input is an event log comprised of...
Article
Mining operations record a large amount of data from multiple sources (such as block model and online processing data) which is neither effectively nor systematically used to understand and improve operational performance. This paper proposes a generic semi-automatable data analytics method, the Integrated Analysis Method (IAM), that addresses the...
Article
Industrial control systems (ICS) are moving from dedicated communications to switched and routed corporate networks, exposing them to the Internet and placing them at risk of cyber-attacks. Existing methods of detecting cyber-attacks, such as intrusion detection systems (IDSs), are commonly implemented in ICS and SCADA networks. However, these devi...
Conference Paper
The main task of an intrusion detection system (IDS) is to detect anomalous behaviors from both within and outside the network system, and there have been increasing studies applying machine learning in this area. The limitations of using a single classifier in the classification of normal traffic and anomalies (attacks) led to the idea of building...
Chapter
Full-text available
Situation faced: Improving Emergency Department (ED) patient flows in terms of processing time, resource use, costs, and patient outcomes is a priority for health service professionals and is vital to the delivery of safe, timely, and effective patient care. Poor patient flows manifest as overcrowding in the ED, prolonged length of stay (LoS), pati...
Conference Paper
Full-text available
Process mining offers a variety of techniques for analyzing process execution event logs. Although process discovery algorithms construct end-to-end process models, they often have difficulties dealing with the complexity of real-life event logs. Discovered models may contain either complex or over-generalized fragments, the interpretation of which...
Data
Implementing mobile learning in curriculum-based educational settings faces challenges related to perceived ethical and learning issues. This study investigated the affordances of mobile technologies to support mathematics instruction by teachers. An exploratory study employing questionnaires and semi-structured interviews revealed that, while math...
Article
Purpose The purpose of this paper is to propose a process mining approach to help in making early predictions to improve students’ learning experience in massive open online courses (MOOCs). It investigates the impact of various machine learning techniques in combination with process mining features to measure effectiveness of these techniques. De...
Conference Paper
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interconnected networks, placing them at risk of cyber attack. ICS networks are typically monitored by an Intrusion Detection System (IDS), however traditional IDSs do not detect attacks which disrupt the control flow of an ICS. ICSs are unique in the repet...
Chapter
Open source intelligence (OSINT) relies on having ready access to data stored on the web and other public sites. For companies concerned about their data being exposed in this way, the natural reaction might be to reduce or minimize their exposure. One way to achieve this is to use a privacy-enhancing protocol of some description, which will have t...
Article
This article uses data-driven techniques combined with established theory in order to analyse gambling behavioural patterns of 91 thousand individuals on a real-world fixed-odds gambling dataset in New Zealand. This research uniquely integrates a mixture of process mining, data mining and confirmatory statistical techniques in order to categorise d...
Article
Process-oriented data mining (process mining) uses algorithms and data (in the form of event logs) to construct models that aim to provide insights into organisational processes. The quality of the data (both form and content) presented to the modeling algorithms is critical to the success of the process mining exercise. Cleaning event logs to addr...
Article
Full-text available
Business process deviance refers to the phenomenon whereby a subset of the executions of a business process deviate, in a negative or positive way, with respect to its expected or desirable outcomes. Deviant executions of a business process include those that violate compliance rules, or executions that undershoot or exceed performance targets. Dev...
Article
Full-text available
Mathematical literacy plays an important role in supporting individuals to fulfil their professional roles in modern society. The affordances of mobile technologies as well as the emergence of new theories in mobile learning have the potential to promote mathematical literacy. However, implementation of mobile learning in Indonesian society faces c...
Article
Through the application of process mining, valuable evidence-based insights can be obtained about business processes in organisations. As a result, the field has seen an increased uptake in recent years as evidenced by success stories and increased tool support. However, despite this impact, current performance analysis capabilities remain somewhat...
Article
Full-text available
Business process analysis and process mining, particularly within the health care domain, remain underutilized. Applied research that employs such techniques to routinely collected health care data enables stakeholders to empirically investigate care as it is delivered by different health providers. However, crossorganizational mining and the compa...
Conference Paper
Full-text available
This paper evaluates the suitability of sequence classification techniques for analyzing deviant business process executions based on event logs. Deviant process executions are those that deviate in a negative or positive way with respect to normative or desirable outcomes, such as executions that undershoot or exceed performance targets. We evalua...
Article
Full-text available
Today’s information systems log vast amounts of data. These collections of data (implicitly) describe events (e.g. placing an order or taking a blood test) and, hence, provide information on the actual execution of business processes. The analysis of such data provides an excellent starting point for business process improvement. This is the realm...
Conference Paper
Full-text available
Variations that exist in the treatment of patients (with similar symptoms) across different hospitals do substantially impact the quality and costs of healthcare. Consequently, it is important to understand the similarities and differences between the practices across different hospitals. This paper presents a case study on the application of proce...
Conference Paper
Full-text available
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a fo...
Article
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant author...
Article
Full-text available
The management of risk in business processes has been the subject of active research in the past few years. Potentially, many benefits can be obtained by integrating the two traditionally separated fields of risk management and business process management, including the ability to minimize risks in business processes by design and to mitigate such...
Article
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined pr...
Conference Paper
Full-text available
Having a reliable understanding about the behaviours, problems, and performance of existing processes is important in enabling a targeted process improvement initiative. Recently, there has been an increase in the application of innovative process mining techniques to facilitate evidence-based understanding about organizations' business processes....
Conference Paper
Full-text available
In the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from raw event logs is performed more or less on a case-...
Conference Paper
The use of Trusted Platform Module (TPM) is becoming increasingly popular in many security systems. To access objects protected by TPM (such as cryptographic keys), several cryptographic protocols, such as the Object Specific Authorization Protocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the...
Article
To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirab...
Chapter
Central to the functioning of the Internet itself as well as most corporate and organisational intranets is the TCP/IP suite of protocols. Within the TCP/IP suite, the transmission control protocol (TCP) offers a robust delivery mechanism for all kinds of data across a network of arbitrary complexity. The other key protocol component, the Internet...
Chapter
In Chap. 1, we have introduced the serious consequences that a Denial of Service (DoS) attack could pose on our society which is increasingly reliant on information and the systems used to store, process, and communicate that information. However, the DoS problem has various dimensions and definitions.
Chapter
Service-oriented architectures (SOAs), implemented using web services, seek to use open and interoperable standards to facilitate easier enterprise application integration, provide application flexibility and facilitate the dynamic composition of applications from component services. As with traditional distributed computing environments such as co...
Conference Paper
Full-text available
The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending we...
Conference Paper
Full-text available
The loosely-coupled and dynamic nature of web services architectures has many benefits, but also leads to an increased vulnerability to denial of service attacks. While many papers have surveyed and described these vulnerabilities, they are often theoretical and lack experimental data to validate them, and assume an obsolete state of web services t...
Conference Paper
Full-text available
SCADA is one of a set of manufacturing-and-control systems that are used to monitor and control critical infrastructure. Such systems extensively utilise communications network protocols such as TCP/IP to interconnect a diverse array of components. A major forthcoming change within TCP/IP is the adoption of the IPv6 protocol and inevitably this cha...
Conference Paper
Full-text available
The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for ’Protecting Critical Infrastructure from Denial of Service Attacks’ allows for the construction, monitoring and management of emulated Distributed Denial of Service attacks using modest hardware resources. The purpose of the tes...
Conference Paper
Full-text available
Privacy enhancing protocols (PEPs) are a family of protocols that allow secure exchange and management of sensitive user information. They are important in preserving users’ privacy in today’s open environment. Proof of the correctness of PEPs is necessary before they can be deployed. However, the traditional provable security approach, though well...
Article
Current identity management systems are not concerned with user privacy. Users must assume that identity providers and service providers will ensure their privacy, which is not always the case. This paper proposes an extension of the existing federated single sign-on (FSSO) systems that adopts the beneficial properties of the user-centric identity...
Conference Paper
Full-text available
This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n referees, is proposed. Next, this re-encryption key distribution protocol is combined with an existing...
Conference Paper
Full-text available
This paper presents and evaluates an improved anonymity revocation protocol. This protocol can be used to strengthen anonymity revocation capability in a privacy-enhancing identity management system. This protocol is user-centric, abuse-resistant, and it provides enforceable conditions fulfillment. We assume the existence of 1 honest referee out of...
Article
Full-text available
There are several Identity Meta Systems emerging in the identity management field, such as CardSpace and Higgins Trust Framework. The goal of an Identity Meta System (IMetS) is to integrate existing or new Identity Management System (IMS) to provide users with seamless interoperability and a consistent user experience. IMetS is a complex system tha...
Conference Paper
Full-text available
There is a lack of built-in privacy mechanisms within the current identity management systems. The guarantee a user has about their privacy is merely the 'trust' that the service providers will enforce their privacy requirements. The contribution of this paper is a proposal for the extension of existing Federated Single Sign-On (FSSO) systems to ad...
Conference Paper
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem a...
Article
Full-text available
There are several areas of identity management that require standardization in order for them to work effectively. This paper proposes three standardization areas: the development of fine-grained privacy standards, the negotiation standards, and the backward privacy standards. Backward privacy refers to the problems that arise due to the massive am...
Article
Full-text available
We propose two variants of a protocol that provides users' private information escrow capability bound to multiple set of conditions in a federated single sign-on environment using trusted platform module (TPM) and secure processor technologies. The first variant assumes the existence of a trusted anonymity revo- cation manager, while the second va...
Article
Full-text available
In a sitting whereby a user interacts with multiple service providers, each service provider is likely to follow different privacy regulations according to the nature of the industry it belongs and the applicable legislative requirements. We propose a protocol that escrows users private information which is bound to multiple set of conditions in a...

Network

Cited By

Projects

Projects (2)
Project
Using data from sensors, combined with statistical and data mining analysis, we developed a methodology to allow extraction of the best mineral processing recipe.