=Paper= {{Paper |id=Vol-3962/paper62 |storemode=property |title=Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques |pdfUrl=https://ceur-ws.org/Vol-3962/paper62.pdf |volume=Vol-3962 |authors=Francesco Romeo,Francesco Blefari,Francesco Pironti,Angelo Furfaro }} ==Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques== https://ceur-ws.org/Vol-3962/paper62.pdf
None