PhD Symposium.- Staking Assets Management on Blockchains: Vision and Roadmap.- Hybrid Context aware method for quality assessment of data streams.- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments.- Towards a Rule-based Recommendation Approach for Business Process Modeling.- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT.- Learning Performance Models Automatically.- Formal Foundations for Intel SGX Data Center Attestation Primitives.- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach.- Formal Quality of Service analysis in the Service Selection problem.- Software Demonstrations.- A Crowdsourcing-Based Knowledge Graph Construction Platform.- Data Interaction for IoT-Aware Wearable Process Management.- SiDD: The Situation-Aware Distributed Deployment System.- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines.- AIOps 2020.- Performance Diagnosis in Cloud Microservices using Deep Learning.- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models.- A Systematic Mapping Study in AIOps.- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks.- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals.- Pre-training Language Models for IT Operations.- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures.- Decentralized Federated Learning Preserves Model and Data Privacy.- Online Memory Leak Detection in the Cloud-based Infrastructures.- Multi-Source Anomaly Detection in Distributed IT Systems.- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services.- Discovering Alarm Correlation Rules for Network Fault Management.- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence.- SLMAD: Statistical Learning-Based Metric Anomaly Detection.- Software Reliability Engineering for Resilient Cloud Operations.- AI-PA 2020.- The Future of Robotic Process Automation (RPA).- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback.- TAP: A Two-Level Trust and Personality-aware Recommender System.- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies.- On how Cognitive Computing will plan your next Systematic Review.- Security Professionals' Skills Representation for Bug Bounty Programs.- Stage-Based Process Performance Mining.- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem.- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation.- Bringing Cognitive Augmentation to Web Browsing Accessibility.- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction.- Eyewitness Prediction During Crisis via Linguistic Features.- STRAPS 2020.- On the definition of Data Regulation Risk.- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets.- Data Centred and Usage-based Security service.- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices.- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud.- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology.- Ontology Evolution using Recoverable SQL Logs.- AI-IOTS 2020.- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention.- A novel approach for detecting IoT Botnet using balanced network traffic attributes.- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection.- System for Monitoring and Control of Vehicle’s Carbon Emissions Using Embedded Hardwares and Cloud Applications.- CFTIC 2020.- An Information Retrieval-based Approach to Activity Recognition in Smart Homes.- Botnet sizes: when maths meet myths.- Cyber Security Education and Future Provision.- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform.- Peer-to-peer application threat investigation.