Linked e-resources
Details
Table of Contents
PhD Symposium
Staking Assets Management on Blockchains: Vision and Roadmap
Hybrid Context aware method for quality assessment of data streams
Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments
Towards a Rule-based Recommendation Approach for Business Process Modeling
Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT
Learning Performance Models Automatically
Formal Foundations for Intel SGX Data Center Attestation Primitives
Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach
Formal Quality of Service analysis in the Service Selection problem
Software Demonstrations
A Crowdsourcing-Based Knowledge Graph Construction Platform
Data Interaction for IoT-Aware Wearable Process Management
SiDD: The Situation-Aware Distributed Deployment System
AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines
AIOps 2020
Performance Diagnosis in Cloud Microservices using Deep Learning
Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models
A Systematic Mapping Study in AIOps
An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks
Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals
Pre-training Language Models for IT Operations
Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures
Decentralized Federated Learning Preserves Model and Data Privacy
Online Memory Leak Detection in the Cloud-based Infrastructures
Multi-Source Anomaly Detection in Distributed IT Systems
TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services
Discovering Alarm Correlation Rules for Network Fault Management
Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence
SLMAD: Statistical Learning-Based Metric Anomaly Detection
Software Reliability Engineering for Resilient Cloud Operations
AI-PA 2020
The Future of Robotic Process Automation (RPA)
Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback
TAP: A Two-Level Trust and Personality-aware Recommender System
Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies
On how Cognitive Computing will plan your next Systematic Review
Security Professionals' Skills Representation for Bug Bounty Programs
Stage-Based Process Performance Mining
AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem
Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation
Bringing Cognitive Augmentation to Web Browsing Accessibility
Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction
Eyewitness Prediction During Crisis via Linguistic Features
STRAPS 2020
On the definition of Data Regulation Risk
Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets
Data Centred and Usage-based Security service
XYZ Monitor: IoT Monitoring of Infrastructures using Microservices
Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud
Higher Order Statistical Analysis in Multiresolution Domain
Application to Breast Cancer Histopathology
Ontology Evolution using Recoverable SQL Logs
AI-IOTS 2020
A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention
A novel approach for detecting IoT Botnet using balanced network traffic attributes
KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection
System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications
CFTIC 2020
An Information Retrieval-based Approach to Activity Recognition in Smart Homes
Botnet sizes: when maths meet myths
Cyber Security Education and Future Provision
Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform
Peer-to-peer application threat investigation.
Staking Assets Management on Blockchains: Vision and Roadmap
Hybrid Context aware method for quality assessment of data streams
Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments
Towards a Rule-based Recommendation Approach for Business Process Modeling
Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT
Learning Performance Models Automatically
Formal Foundations for Intel SGX Data Center Attestation Primitives
Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach
Formal Quality of Service analysis in the Service Selection problem
Software Demonstrations
A Crowdsourcing-Based Knowledge Graph Construction Platform
Data Interaction for IoT-Aware Wearable Process Management
SiDD: The Situation-Aware Distributed Deployment System
AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines
AIOps 2020
Performance Diagnosis in Cloud Microservices using Deep Learning
Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models
A Systematic Mapping Study in AIOps
An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks
Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals
Pre-training Language Models for IT Operations
Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures
Decentralized Federated Learning Preserves Model and Data Privacy
Online Memory Leak Detection in the Cloud-based Infrastructures
Multi-Source Anomaly Detection in Distributed IT Systems
TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services
Discovering Alarm Correlation Rules for Network Fault Management
Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence
SLMAD: Statistical Learning-Based Metric Anomaly Detection
Software Reliability Engineering for Resilient Cloud Operations
AI-PA 2020
The Future of Robotic Process Automation (RPA)
Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback
TAP: A Two-Level Trust and Personality-aware Recommender System
Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies
On how Cognitive Computing will plan your next Systematic Review
Security Professionals' Skills Representation for Bug Bounty Programs
Stage-Based Process Performance Mining
AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem
Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation
Bringing Cognitive Augmentation to Web Browsing Accessibility
Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction
Eyewitness Prediction During Crisis via Linguistic Features
STRAPS 2020
On the definition of Data Regulation Risk
Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets
Data Centred and Usage-based Security service
XYZ Monitor: IoT Monitoring of Infrastructures using Microservices
Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud
Higher Order Statistical Analysis in Multiresolution Domain
Application to Breast Cancer Histopathology
Ontology Evolution using Recoverable SQL Logs
AI-IOTS 2020
A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention
A novel approach for detecting IoT Botnet using balanced network traffic attributes
KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection
System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications
CFTIC 2020
An Information Retrieval-based Approach to Activity Recognition in Smart Homes
Botnet sizes: when maths meet myths
Cyber Security Education and Future Provision
Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform
Peer-to-peer application threat investigation.