Control-flow Reconstruction Attacks on Business Process Models

Add code
Sep 17, 2024
Figure 1 for Control-flow Reconstruction Attacks on Business Process Models
Figure 2 for Control-flow Reconstruction Attacks on Business Process Models
Figure 3 for Control-flow Reconstruction Attacks on Business Process Models
Figure 4 for Control-flow Reconstruction Attacks on Business Process Models

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: