This repository contains a dataset of simulation game playthroughs from 19 participants. Data were generated so that they can be used for process mining analysis. This dataset consists of one CSV file wit the structure: caseID;activity;timestamp.
MACÁK, Martin, Štefan Bojnák and Barbora Bühnová. Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study. In Proceedings of the 16th Conference on Computer Science and Intelligence Systems. New York: IEEE, 2021. p. 349-356.