| Título : |
AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Hacid, Hakim, ; Outay, Fatma, ; Paik, Hye-young, ; Alloum, Amira, ; Petrocchi, Marinella, ; Bouadjenek, Mohamed Reda, ; Beheshti, Amin, ; Liu, Xumin, ; Maaradji, Abderrahmane, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIII, 652 p. 216 ilustraciones, 158 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-76352-7 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Software de la aplicacion Ingeniería Informática Red de computadoras Teoría de la codificación Teoría de la información Protección de datos Ingeniería de software Aprendizaje automático Aplicaciones informáticas y de sistemas de información Ingeniería Informática y Redes Teoría de la codificación y la información Seguridad de datos e información |
| Índice Dewey: |
005.3 Ciencia de los computadores (Programas) |
| Resumen: |
Este libro constituye artículos revisados y seleccionados de los eventos de satélites científicos celebrados junto con la 18.ª Conferencia Internacional sobre Computación Orientada a Servicios, ICSOC 2020. La conferencia se celebró virtualmente del 14 al 17 de diciembre de 2020. Se recibió un total de 125 presentaciones para el Eventos satelitales. El volumen incluye 9 artículos del PhD Symposium Track, 4 artículos del Demonstration Track y 45 artículos de los siguientes talleres: Taller internacional sobre inteligencia artificial para operaciones de TI (AIOps) Taller internacional sobre ciberforense y desafíos de investigación de amenazas en infraestructuras emergentes ( CFTIC 2020) 2do Taller sobre Integración y Procesamiento Inteligente de Datos (STRAPS 2020) Taller Internacional sobre Automatización de Procesos habilitados por IA (AI-PA 2020) Taller Internacional sobre Inteligencia Artificial en los Servicios de Seguridad de IoT (AI-IOTS 2020). |
| Nota de contenido: |
PhD Symposium -- Staking Assets Management on Blockchains: Vision and Roadmap -- Hybrid Context aware method for quality assessment of data streams -- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments -- Towards a Rule-based Recommendation Approach for Business Process Modeling -- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT -- Learning Performance Models Automatically -- Formal Foundations for Intel SGX Data Center Attestation Primitives -- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach -- Formal Quality of Service analysis in the Service Selection problem -- Software Demonstrations -- A Crowdsourcing-Based Knowledge Graph Construction Platform -- Data Interaction for IoT-Aware Wearable Process Management -- SiDD: The Situation-Aware Distributed Deployment System -- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines -- AIOps 2020 -- Performance Diagnosis in Cloud Microservices using Deep Learning -- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models -- A Systematic Mapping Study in AIOps -- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks -- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized Federated Learning Preserves Model and Data Privacy -- Online Memory Leak Detection in the Cloud-based Infrastructures -- Multi-Source Anomaly Detection in Distributed IT Systems -- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services -- Discovering Alarm Correlation Rules for Network Fault Management -- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence -- SLMAD: Statistical Learning-Based Metric Anomaly Detection -- Software Reliability Engineering for Resilient Cloud Operations -- AI-PA 2020 -- The Future of Robotic Process Automation (RPA) -- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback -- TAP: A Two-Level Trust and Personality-aware Recommender System -- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies -- On how Cognitive Computing will plan your next Systematic Review -- Security Professionals' Skills Representation for Bug Bounty Programs -- Stage-Based Process Performance Mining -- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem -- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation -- Bringing Cognitive Augmentation to Web Browsing Accessibility -- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction -- Eyewitness Prediction During Crisis via Linguistic Features -- STRAPS 2020 -- On the definition of Data Regulation Risk -- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets -- Data Centred and Usage-based Security service -- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices -- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud -- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology -- Ontology Evolution using Recoverable SQL Logs -- AI-IOTS 2020 -- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention -- A novel approach for detecting IoT Botnet using balanced network traffic attributes -- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection -- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications -- CFTIC 2020 -- An Information Retrieval-based Approach to Activity Recognition in Smart Homes -- Botnet sizes: when maths meet myths -- Cyber Security Education and Future Provision -- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform -- Peer-to-peer application threat investigation. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings [documento electrónico] / Hacid, Hakim, ; Outay, Fatma, ; Paik, Hye-young, ; Alloum, Amira, ; Petrocchi, Marinella, ; Bouadjenek, Mohamed Reda, ; Beheshti, Amin, ; Liu, Xumin, ; Maaradji, Abderrahmane, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 652 p. 216 ilustraciones, 158 ilustraciones en color. ISBN : 978-3-030-76352-7 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Software de la aplicacion Ingeniería Informática Red de computadoras Teoría de la codificación Teoría de la información Protección de datos Ingeniería de software Aprendizaje automático Aplicaciones informáticas y de sistemas de información Ingeniería Informática y Redes Teoría de la codificación y la información Seguridad de datos e información |
| Índice Dewey: |
005.3 Ciencia de los computadores (Programas) |
| Resumen: |
Este libro constituye artículos revisados y seleccionados de los eventos de satélites científicos celebrados junto con la 18.ª Conferencia Internacional sobre Computación Orientada a Servicios, ICSOC 2020. La conferencia se celebró virtualmente del 14 al 17 de diciembre de 2020. Se recibió un total de 125 presentaciones para el Eventos satelitales. El volumen incluye 9 artículos del PhD Symposium Track, 4 artículos del Demonstration Track y 45 artículos de los siguientes talleres: Taller internacional sobre inteligencia artificial para operaciones de TI (AIOps) Taller internacional sobre ciberforense y desafíos de investigación de amenazas en infraestructuras emergentes ( CFTIC 2020) 2do Taller sobre Integración y Procesamiento Inteligente de Datos (STRAPS 2020) Taller Internacional sobre Automatización de Procesos habilitados por IA (AI-PA 2020) Taller Internacional sobre Inteligencia Artificial en los Servicios de Seguridad de IoT (AI-IOTS 2020). |
| Nota de contenido: |
PhD Symposium -- Staking Assets Management on Blockchains: Vision and Roadmap -- Hybrid Context aware method for quality assessment of data streams -- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments -- Towards a Rule-based Recommendation Approach for Business Process Modeling -- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT -- Learning Performance Models Automatically -- Formal Foundations for Intel SGX Data Center Attestation Primitives -- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach -- Formal Quality of Service analysis in the Service Selection problem -- Software Demonstrations -- A Crowdsourcing-Based Knowledge Graph Construction Platform -- Data Interaction for IoT-Aware Wearable Process Management -- SiDD: The Situation-Aware Distributed Deployment System -- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines -- AIOps 2020 -- Performance Diagnosis in Cloud Microservices using Deep Learning -- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models -- A Systematic Mapping Study in AIOps -- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks -- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized Federated Learning Preserves Model and Data Privacy -- Online Memory Leak Detection in the Cloud-based Infrastructures -- Multi-Source Anomaly Detection in Distributed IT Systems -- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services -- Discovering Alarm Correlation Rules for Network Fault Management -- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence -- SLMAD: Statistical Learning-Based Metric Anomaly Detection -- Software Reliability Engineering for Resilient Cloud Operations -- AI-PA 2020 -- The Future of Robotic Process Automation (RPA) -- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback -- TAP: A Two-Level Trust and Personality-aware Recommender System -- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies -- On how Cognitive Computing will plan your next Systematic Review -- Security Professionals' Skills Representation for Bug Bounty Programs -- Stage-Based Process Performance Mining -- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem -- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation -- Bringing Cognitive Augmentation to Web Browsing Accessibility -- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction -- Eyewitness Prediction During Crisis via Linguistic Features -- STRAPS 2020 -- On the definition of Data Regulation Risk -- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets -- Data Centred and Usage-based Security service -- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices -- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud -- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology -- Ontology Evolution using Recoverable SQL Logs -- AI-IOTS 2020 -- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention -- A novel approach for detecting IoT Botnet using balanced network traffic attributes -- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection -- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications -- CFTIC 2020 -- An Information Retrieval-based Approach to Activity Recognition in Smart Homes -- Botnet sizes: when maths meet myths -- Cyber Security Education and Future Provision -- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform -- Peer-to-peer application threat investigation. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |