Process control

DRACONS (DecaRbonisAtion and CO2 NanoSequestration)

DRACONS (DecaRbonisAtion and CO2 NanoSequestration)

DRACONS research group aims at developing sustainable industrial cycles and innovative CO2 capture processes (see also https://giorgiovilardi.wixsite.com/dracons)

Automated discovery of process models from event logs: review and benchmark

Process mining allows analysts to exploit logs of historical executions of business processes to extract insights regarding the actual performance of these processes. One of the most widely studied process mining operations is automated process discovery. An automated process discovery method takes as input an event log, and produces as output a business process model that captures the control-flow relations between tasks that are observed in or implied by the event log.

The Internet of Things Meets Business Process Management: A Manifesto

The Internet of Things (IoT) refers to a network of connected devices that collects and exchanges data through the Internet. These things can be artificial or natural and interact as autonomous agents that form a complex system. In turn, business process management (BPM) was established to analyze, discover, design, implement, execute, monitor, and evolve collaborative business processes within and across organizations.

A Novel Stealthy Attack to Gather SDN Configuration-Information

Software Defined Networking (SDN) is a recent network architecture based on the separation of forwarding functions from network logic, and provides high flexibility in the management of the network. In this paper, we show how an attacker can exploit SDN programmability to obtain detailed knowledge about the network behaviour. In particular, we introduce a novel attack, named Know Your Enemy (KYE), which allows an attacker to gather vital information about the configuration of the network.

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma