Networked Systems : 11th International Conference, NETYS 2023, Benguerir, Morocco, May 22-24, 2023, proceedings / David Mohaisen, Thomas Wies, editors.
Material type:
TextSeries: Lecture notes in computer science ; 14067.Publisher: Cham : Springer, [2023]Copyright date: ©2023Description: 1 online resource (x, 175 pages) : illustrations (some color)Content type: - text
- computer
- online resource
- 9783031377655
- 3031377656
- NETYS 2023
- Computer networks -- Congresses
- Wireless communication systems -- Congresses
- Mobile computing -- Congresses
- Cloud computing -- Congresses
- Réseaux d'ordinateurs -- Congrès
- Transmission sans fil -- Congrès
- Informatique mobile -- Congrès
- Infonuagique -- Congrès
- Cloud computing
- Computer networks
- Mobile computing
- Wireless communication systems
- 004.6 23/eng/20230712
- TK5105.5
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
Includes author index.
This book constitutes the refereed proceedings of the 11th International Conference on Networked Systems, NETYS 2023, held in Benguerir, Morocco, during May 22-24, 2023. The 9 full papers and 3 short papers presented were carefully reviewed and selected from 31 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science, parallel/concurrent/distributed programming, machine learning, multi-core architectures, networks, and security.
Machine Learning -- Detection of Fake News Through Heterogeneous Graph Interactions -- Species Recognition via Active Learning -- Federated Graph Neural Network for Threat Intelligence -- Formal Methods -- A Formal Analysis of Karn's Algorithm -- Comparing Causal Convergence Consistency Models -- Security & Privacy -- Encrypted search is not enough to ensure privacy -- Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN -- Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories -- Fault Tolerance -- Consensus on Unknown Torus with Dense Byzantine Faults -- Distributed Systems -- Approximation Algorithms for Drone Delivery Scheduling Problem -- Pebble guided Treasure Hunt in Plane -- Distance-2-Dispersion: Dispersion with Further Constraints.
Online resource; title from PDF title page (SpringerLink, viewed July 12, 2023).