001471638 000__ 04147cam\\2200673\i\4500 001471638 001__ 1471638 001471638 003__ OCoLC 001471638 005__ 20230908003307.0 001471638 006__ m\\\\\o\\d\\\\\\\\ 001471638 007__ cr\cn\nnnunnun 001471638 008__ 230712s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001471638 020__ $$a9783031377655$$q(electronic bk.) 001471638 020__ $$a3031377656$$q(electronic bk.) 001471638 020__ $$z9783031377648 001471638 0247_ $$a10.1007/978-3-031-37765-5$$2doi 001471638 035__ $$aSP(OCoLC)1390127327 001471638 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP 001471638 049__ $$aISEA 001471638 050_4 $$aTK5105.5 001471638 08204 $$a004.6$$223/eng/20230712 001471638 1112_ $$aNETYS (Conference)$$n(11th :$$d2023 :$$cBenguerir, Morocco). 001471638 24510 $$aNetworked Systems :$$b11th International Conference, NETYS 2023, Benguerir, Morocco, May 22-24, 2023, proceedings /$$cDavid Mohaisen, Thomas Wies, editors. 001471638 24630 $$aNETYS 2023 001471638 264_1 $$aCham :$$bSpringer,$$c[2023] 001471638 264_4 $$c©2023 001471638 300__ $$a1 online resource (x, 175 pages) :$$billustrations (some color). 001471638 336__ $$atext$$btxt$$2rdacontent 001471638 337__ $$acomputer$$bc$$2rdamedia 001471638 338__ $$aonline resource$$bcr$$2rdacarrier 001471638 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v14067 001471638 500__ $$aInternational conference proceedings. 001471638 500__ $$aIncludes author index. 001471638 5050_ $$aMachine Learning -- Detection of Fake News Through Heterogeneous Graph Interactions -- Species Recognition via Active Learning -- Federated Graph Neural Network for Threat Intelligence -- Formal Methods -- A Formal Analysis of Karn’s Algorithm -- Comparing Causal Convergence Consistency Models -- Security & Privacy -- Encrypted search is not enough to ensure privacy -- Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN -- Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories -- Fault Tolerance -- Consensus on Unknown Torus with Dense Byzantine Faults -- Distributed Systems -- Approximation Algorithms for Drone Delivery Scheduling Problem -- Pebble guided Treasure Hunt in Plane -- Distance-2-Dispersion: Dispersion with Further Constraints. 001471638 506__ $$aAccess limited to authorized users. 001471638 520__ $$aThis book constitutes the refereed proceedings of the 11th International Conference on Networked Systems, NETYS 2023, held in Benguerir, Morocco, during May 22–24, 2023. The 9 full papers and 3 short papers presented were carefully reviewed and selected from 31 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science, parallel/concurrent/distributed programming, machine learning, multi-core architectures, networks, and security. 001471638 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 12, 2023). 001471638 650_0 $$aComputer networks$$vCongresses. 001471638 650_0 $$aWireless communication systems$$vCongresses. 001471638 650_0 $$aMobile computing$$vCongresses. 001471638 650_0 $$aCloud computing$$vCongresses. 001471638 655_0 $$aElectronic books. 001471638 655_7 $$aConference papers and proceedings.$$2lcgft 001471638 7001_ $$aMohaisen, David,$$eeditor. 001471638 7001_ $$aWies, Thomas,$$eeditor. 001471638 830_0 $$aLecture notes in computer science ;$$v14067.$$x1611-3349 001471638 852__ $$bebk 001471638 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-37765-5$$zOnline Access$$91397441.1 001471638 909CO $$ooai:library.usi.edu:1471638$$pGLOBAL_SET 001471638 980__ $$aBIB 001471638 980__ $$aEBOOK 001471638 982__ $$aEbook 001471638 983__ $$aOnline 001471638 994__ $$a92$$bISE