000 | 03415nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-031-37765-5 | ||
003 | DE-He213 | ||
005 | 20240730181311.0 | ||
007 | cr nn 008mamaa | ||
008 | 230706s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031377655 _9978-3-031-37765-5 |
||
024 | 7 |
_a10.1007/978-3-031-37765-5 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aNetworked Systems _h[electronic resource] : _b11th International Conference, NETYS 2023, Benguerir, Morocco, May 22-24, 2023, Proceedings / _cedited by David Mohaisen, Thomas Wies. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aX, 175 p. 40 illus., 17 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14067 |
|
505 | 0 | _aMachine Learning -- Detection of Fake News Through Heterogeneous Graph Interactions -- Species Recognition via Active Learning -- Federated Graph Neural Network for Threat Intelligence -- Formal Methods -- A Formal Analysis of Karn's Algorithm -- Comparing Causal Convergence Consistency Models -- Security & Privacy -- Encrypted search is not enough to ensure privacy -- Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN -- Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories -- Fault Tolerance -- Consensus on Unknown Torus with Dense Byzantine Faults -- Distributed Systems -- Approximation Algorithms for Drone Delivery Scheduling Problem -- Pebble guided Treasure Hunt in Plane -- Distance-2-Dispersion: Dispersion with Further Constraints. | |
520 | _aThis book constitutes the refereed proceedings of the 11th International Conference on Networked Systems, NETYS 2023, held in Benguerir, Morocco, during May 22-24, 2023. The 9 full papers and 3 short papers presented were carefully reviewed and selected from 31 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science, parallel/concurrent/distributed programming, machine learning, multi-core architectures, networks, and security. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9124300 |
700 | 1 |
_aMohaisen, David. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124301 |
|
700 | 1 |
_aWies, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9124302 |
|
710 | 2 |
_aSpringerLink (Online service) _9124303 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031377648 |
776 | 0 | 8 |
_iPrinted edition: _z9783031377662 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14067 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-37765-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90807 _d90807 |