Skip to Main Content

Quantifying the Re-identification Risk of Event Logs for Process Mining