000 08512nam a22007335i 4500
001 978-3-030-76352-7
003 DE-He213
005 20240730203315.0
007 cr nn 008mamaa
008 210529s2021 sz | s |||| 0|eng d
020 _a9783030763527
_9978-3-030-76352-7
024 7 _a10.1007/978-3-030-76352-7
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aService-Oriented Computing - ICSOC 2020 Workshops
_h[electronic resource] :
_bAIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14-17, 2020, Proceedings /
_cedited by Hakim Hacid, Fatma Outay, Hye-young Paik, Amira Alloum, Marinella Petrocchi, Mohamed Reda Bouadjenek, Amin Beheshti, Xumin Liu, Abderrahmane Maaradji.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXIII, 652 p. 216 illus., 158 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v12632
505 0 _aPhD Symposium -- Staking Assets Management on Blockchains: Vision and Roadmap -- Hybrid Context aware method for quality assessment of data streams -- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments -- Towards a Rule-based Recommendation Approach for Business Process Modeling -- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT -- Learning Performance Models Automatically -- Formal Foundations for Intel SGX Data Center Attestation Primitives -- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach -- Formal Quality of Service analysis in the Service Selection problem -- Software Demonstrations -- A Crowdsourcing-Based Knowledge Graph Construction Platform -- Data Interaction for IoT-Aware Wearable Process Management -- SiDD: The Situation-Aware Distributed Deployment System -- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines -- AIOps 2020 -- Performance Diagnosis in Cloud Microservices using Deep Learning -- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models -- A Systematic Mapping Study in AIOps -- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks -- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized Federated Learning Preserves Model and Data Privacy -- Online Memory Leak Detection in the Cloud-based Infrastructures -- Multi-Source Anomaly Detection in Distributed IT Systems -- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services -- Discovering Alarm Correlation Rules for Network Fault Management -- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence -- SLMAD: Statistical Learning-Based Metric Anomaly Detection -- Software Reliability Engineering for Resilient Cloud Operations -- AI-PA 2020 -- The Future of Robotic Process Automation (RPA) -- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback -- TAP: A Two-Level Trust and Personality-aware Recommender System -- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies -- On how Cognitive Computing will plan your next Systematic Review -- Security Professionals' Skills Representation for Bug Bounty Programs -- Stage-Based Process Performance Mining -- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem -- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation -- Bringing Cognitive Augmentation to Web Browsing Accessibility -- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction -- Eyewitness Prediction During Crisis via Linguistic Features -- STRAPS 2020 -- On the definition of Data Regulation Risk -- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets -- Data Centred and Usage-based Security service -- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices -- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud -- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology -- Ontology Evolution using Recoverable SQL Logs -- AI-IOTS 2020 -- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention -- A novel approach for detecting IoT Botnet using balanced network traffic attributes -- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection -- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications -- CFTIC 2020 -- An Information Retrieval-based Approach to Activity Recognition in Smart Homes -- Botnet sizes: when maths meet myths -- Cyber Security Education and Future Provision -- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform -- Peer-to-peer application threat investigation.
520 _aThis book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020. A total of 125 submissions were received for the satellite events. The volume includes 9 papers from the PhD Symposium Track, 4 papers from the Demonstration Track, and 45 papers from the following workshops: International Workshop on Artificial Intelligence for IT Operations (AIOps) International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020) 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020) International Workshop on AI-enabled Process Automation (AI-PA 2020) International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020) .
650 0 _aApplication software.
_9175364
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aData protection.
_97245
650 0 _aSoftware engineering.
_94138
650 0 _aMachine learning.
_91831
650 1 4 _aComputer and Information Systems Applications.
_9175365
650 2 4 _aComputer Engineering and Networks.
_9175366
650 2 4 _aCoding and Information Theory.
_9175367
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aMachine Learning.
_91831
700 1 _aHacid, Hakim.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175368
700 1 _aOutay, Fatma.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175369
700 1 _aPaik, Hye-young.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175370
700 1 _aAlloum, Amira.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175371
700 1 _aPetrocchi, Marinella.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175372
700 1 _aBouadjenek, Mohamed Reda.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175373
700 1 _aBeheshti, Amin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175374
700 1 _aLiu, Xumin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175375
700 1 _aMaaradji, Abderrahmane.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9175376
710 2 _aSpringerLink (Online service)
_9175377
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030763510
776 0 8 _iPrinted edition:
_z9783030763534
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v12632
_9175378
856 4 0 _uhttps://doi.org/10.1007/978-3-030-76352-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c97436
_d97436