Skip to Main Content

Control-flow Reconstruction Attacks on Business Process Models