Process Mining

Research and White Papers

We’re publishing research and adding new white papers frequently. Check back often.

Detecting Botnet Signals Using Process Mining: Detecting bots and elucidating botnets is an active area of research. This draft journal article presents weaponized bot detection analysis results from an analysis of an ISIS terrorist Twitter dataset using process technologies. A future effort is presented to understand cross-platform choreographed information warfare campaigns and recursive adversarial modeling. (Draft in Submission) 

Process Mining Organization Email Data and National Security Implications: Tremendous intelligence is contained within unstructured organizational data sources. Properly analyzed, these data provide government and private organizations with actionable management and risk mitigation insights. Using explainable process technologies combined with natural language processing, a private critical infrastructure participant’s organizational process model is discovered from semi-structured email data. Data derived from the process model are presented which elucidate internal operations. National security implications and future research needs are described. (Draft in Submission) 

A Process Mining Approach for Protecting Self-Organizing Critical Infrastructure Ecosystems: Self-organized ecosystems are found throughout the natural world, including critical infrastructure. Self-organized criticality is the tendency of some systems to naturally self-organize into critical states far from equilibrium and which are barely stable. Small changes or stimuli can result in cascading chain reactions which may have unwanted or devastating effects on economies or societies. Process technologies offer an expedient method for simulating self-organized critical infrastructure ecosystems, understanding criticality within these ecosystems, and adopting mitigation strategies analogous to controlled avalanches. Several case studies from broad domains present naturally occurring criticality as well as deliberate ecosystem attacks designed to induce criticality or trigger catastrophic events. (Draft in Submission) 

Space Object Process Analysis: Objects in space from four different countries are examined from a process perspective using explainable artificial intelligence. For all countries, objects tend to remain predominantly in the same process activity state. Activity state transitions are observed, however, suggesting intentional maneuver, object degradation, or other ecosystem behaviors. Future work is suggested. (Draft in Submission) 

This INFORMS ORMS article describes the right way to adopt process mining in your organization. This presentation offer a general process mining overview.

FOCAL Information Warfare Defense StandardTM: This Information Warfare Defense Standard helps public and private critical infrastructure participants defend against the growing information and cognitive threat, which is fueled by weaponized AI. It may also facilitate a whole-of-society effort to protect freedom and individual liberty. Five interlocking  tenets help organizations shift culture, train the workforce, identify vulnerabilities, prepare for and recover from attack, and contribute to the community as a vested stakeholder. This short article offers and introduction, and a detailed technical paper accompanies the standard, as well. The FOCAL Information Warfare Defense StandardTM is available for free. Contact us to request a copy.

Process Mining: The Missing Capability in Information WarfareFrom an information warfare perspective, The Cold War never ended. Moreover, the 21st Century presents vivid new security challenges related to information weaponry. This article describes novel, scalable, and extensible process-oriented methodologies not currently part of the United States’ informational warfare solution set.

Process Mining as a Platform Plug-in. Interested in Customer Journey Mapping? This paper discusses how process mining provides extreme value, at scale, for software platforms with large client/user bases.

Process Mining in a DoD Context. This paper articulates the necessity of adopting process mining technologies across the Department of Defense (DoD) and adjacent national security agencies in order to ensure America remains the premier global power in today’s emerging inter-state competitive environment.

Easing Organizational Change. Interested in mergers and acquisitions or re-orgs? Check this out.

Major New IT System Implementations. Process Mining eases the disruption caused by new system adoptions and outputs an improved solution.