2022 IEEE 20th International Conference on Industrial Informatics (INDIN) 2022
DOI: 10.1109/indin51773.2022.9976111
|View full text |Cite
|
Sign up to set email alerts
|

Process mining in industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…We use ProM's causal C-Net technique, which allows for processing of all process events by focusing on the relation between activities that occur most frequently, to avoid overly complex processes and to focus on activities and relations only. The causal C-Net technique generates a dependency graph, where the nodes represent activities and the arcs represent causal dependencies ( Xavier et al, 2022 ). The de facto process analysis also yields resource information, including the human resources allocated to tasks and the time spent on these tasks.…”
Section: Identifying the De Facto Process Modelmentioning
confidence: 99%
“…We use ProM's causal C-Net technique, which allows for processing of all process events by focusing on the relation between activities that occur most frequently, to avoid overly complex processes and to focus on activities and relations only. The causal C-Net technique generates a dependency graph, where the nodes represent activities and the arcs represent causal dependencies ( Xavier et al, 2022 ). The de facto process analysis also yields resource information, including the human resources allocated to tasks and the time spent on these tasks.…”
Section: Identifying the De Facto Process Modelmentioning
confidence: 99%
“…In the considered architecture, it is easy to suppose that devices are easy to be identified; as regards the users, it is reasonable to suppose that many interactions may be done intermediated by some sort of smart devices (e.g., a simple application running on a smartphone), allowing the users in interacting with the building in a simplified and secure way. On the other hand, the authors are aware that the application of PM in Cyber-Physical Systems (CPSs) can be affected by unavailability or by the partial availability of interaction session identifiers [34]. In this case, one of the most widespread techniques is the application of methods able to label with a proper value of caseId those events where such information is not present [9].…”
Section: User Modelmentioning
confidence: 99%