Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 3 of 3
  • Item
    Thumbnail Image
    Strengthening Australia’s cybersecurity regulations and incentives: Response to the Department of Home Affairs Discussion Paper
    Achrekar, A ; Ahmad, A ; Chang, S ; Cohney, S ; Dreyfus, S ; Leckie, C ; Murray, T ; Paterson, J ; Pham, VT ; Sonenberg, E ( 2021)
    The development of the regulatory and incentives framework is a key opportunity to align Australian enterprises’ cybersecurity practice with latest research, particularly on consumer protections, and emerging cyber threats and security challenges. The Australian Government has an essential role in establishing incentives to encourage best practice and consequences to combat poor practice. It will be increasingly important for government at all levels to act as a role model, by following best practice in the conduct of its public business.
  • Item
    Thumbnail Image
    Discovering executable routine specifications from user interaction logs
    Leno, V ; Augusto, A ; La Rosa, M ; Polyvyanyy, A ; Dumas, M ; Maggi, F ( 2021)
  • Item
    Thumbnail Image
    Encoder-Decoder Generative Adversarial Nets for Suffix Generation and Remaining Time Predicationof Business Process Models
    Taymouri, F ; La Rosa, M ( 2020)
    Predictive process monitoring aims to predict future characteristics of an ongoing process case, such as case outcome or remaining time till completion. Several deep learning models have been proposed to address suffix generation and remaining time prediction for ongoing process cases. Though they generally increase the prediction accuracy compared to traditional machine learning models, they still suffer from critical issues. For example, suffixes are generated by training a model on iteratively predicting the next activity. As such, prediction errors are propagated from one prediction step to the next, resulting in poor reliability, i.e., the ground truth and the generated suffixes may easily become dissimilar. Also, conventional training of neural networks via maximum likelihood estimation is prone to overfitting and prevents the model from generating sequences of variable length and with different activity labels. This is an unrealistic simplification as business process cases are often of variable length in reality. To address these shortcomings, this paper proposes an encoder-decoder architecture grounded on Generative Adversarial Networks (GANs), that generates a sequence of activities and their timestamps in an end-to-end way. GANs work well with differentiable data such as images. However, a suffix is a sequence of categorical items. To this end, we use the Gumbel-Softmax distribution to get a differentiable continuous approximation. The training works by putting one neural network against the other in a two-player game (hence the “adversarial” nature), which leads to generating suffixes close to the ground truth. From the experimental evaluation it emerges that the approach is superior to the baselines in terms of the accuracy of the predicted suffixes and corresponding remaining times, despite using a naive feature encoding and only engineering features based on control flow and events completion time.