=Paper=
{{Paper
|id=Vol-3962/paper62
|storemode=property
|title=Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques
|pdfUrl=https://ceur-ws.org/Vol-3962/paper62.pdf
|volume=Vol-3962
|authors=Francesco Romeo,Francesco Blefari,Francesco Pironti,Angelo Furfaro
}}
==Unveiling Attack Patterns from CTF Network Logs with Process Mining Techniques==
None