Dr Suriadi Lim
This person does not currently hold a position at QUT.
Personal details
Keywords
process mining, data mining, data analytics, information security, data science, petri nets, business process management, privacy, cryptographic protocols
Research field
Information Systems, Data Format
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- PhD (Queensland University of Technology)
- Bachelor of Information Technology (Honours) (Queensland University of Technology)
- Bachelor of Information Technology (Data Communications) (Queensland University of Technology)
Publications
- Suriadi, S., Wynn, M., Xu, J., van der Aalst, W. & ter Hofstede, A. (2017). Discovering work prioritisation patterns from event logs. Decision Support Systems, 100, 77–92. https://eprints.qut.edu.au/103556
- Suriadi, S., Andrews, R., ter Hofstede, A. & Wynn, M. (2017). Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs. Information Systems, 64, 132–150. https://eprints.qut.edu.au/97670
- de Leoni, M., Suriadi, S., ter Hofstede, A. & van der Aalst, W. (2016). Turning event logs into process movies: animating what has really happened. Software and Systems Modeling, 15(3), 707–732. https://eprints.qut.edu.au/78915
- Seifi, Y., Suriadi, S., Foo, E. & Boyd, C. (2015). Analysis of two authorization protocols using Colored Petri Nets. International Journal of Information Security, 14(3), 221–247. https://eprints.qut.edu.au/74296
- Suriadi, S., Ouyang, C., van der Aalst, W. & ter Hofstede, A. (2015). Event interval analysis: Why do processes take time? Decision Support Systems, 79, 77–98. https://eprints.qut.edu.au/76205
- Partington, A., Wynn, M., Suriadi, S., Ouyang, C. & Karnon, J. (2015). Process mining for clinical processes: A comparative analysis of four Australian hospitals. ACM Transactions on Management Information Systems, 5(4), 1–18. https://eprints.qut.edu.au/66728
- Suriadi, S., Wynn, M., Ouyang, C., ter Hofstede, A. & van Dijk, N. (2013). Understanding process behaviours in a large insurance company in Australia: A case study. Advanced Information Systems Engineering: 25th International Conference, CAiSE 2013, Proceedings [Lecture Notes in Computer Science, Vol 7908], 449–464. https://eprints.qut.edu.au/55502
- Suriadi, S., Ouyang, C. & Foo, E. (2012). Privacy compliance verification in cryptographic protocols. LNCS Transactions on Petri Nets and Other Models of Concurrency (ToPNoC), 6, 251–276. https://eprints.qut.edu.au/48484
- Suriadi, S., Stebila, D., Clark, A. & Liu, H. (2011). Defending web services against denial of service attacks using client puzzles. Proceedings of 2011 IEEE 9th International Conference on Web Services, 25–32. https://eprints.qut.edu.au/43667
- Suriadi, S., Foo, E. & Josang, A. (2009). A user-centric federated single sign-on system. Journal of Network and Computer Applications, 32(2), 388–401. https://eprints.qut.edu.au/13122
QUT ePrints
For more publications by Suriadi, explore their research in QUT ePrints (our digital repository).