No abstract available.
Front Matter
Front Matter
Detection of Fake News Through Heterogeneous Graph Interactions
Fake news is one of the most prominent forms of disinformation. Unfortunately, today’s advanced social media platforms allow for the rapid transmission of fake news, which may negatively impact several aspects of human society. Despite the ...
Edge-Based Bird Species Recognition via Active Learning
- Hicham Bellafkir,
- Markus Vogelbacher,
- Daniel Schneider,
- Markus Mühling,
- Nikolaus Korfhage,
- Bernd Freisleben
Monitoring and mitigating the ongoing decline of biodiversity is one of the most important global challenges that we face today. In this context, birds are important for many ecosystems, since they link habitats, resources, and biological ...
A Peer to Peer Federated Graph Neural Network for Threat Intelligence
Threat intelligence is the process of collecting and analyzing information about potential cyber threats. Several approaches have been conducted for cyber threat detection based on the federated learning method. These approaches aim to establish a ...
Front Matter
A Formal Analysis of Karn’s Algorithm
The stability of the Internet relies on timeouts. The timeout value, known as the Retransmission TimeOut (RTO), is constantly updated, based on sampling the Round Trip Time (RTT) of each packet as measured by its sender – that is, the time between ...
Comparing Causal Convergence Consistency Models
In distributed databases, the CAP theorem establishes that a distributed storage system can only ensure two out of three properties: strong data consistency (i.e., reads returning the most recent writes), availability, or partition tolerance. ...
Front Matter
Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN
SDN enables centralized control of network services by separating control and data planes, providing greater flexibility and scalability in network traffic management. However, this architecture also creates new security challenges, such as a ...
Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime Theories
The current evolution of the cyber-threat ecosystem shows that no organization can be considered invulnerable against security breach. It is therefore important to highlight exogenous factors other than those related to an organization’s security ...
Front Matter
Front Matter
Approximation Algorithms for Drone Delivery Scheduling Problem
The coordination among drones and ground vehicles for last-mile delivery has gained significant interest in recent years. In this paper, we study multiple drone delivery scheduling problem (MDSP) [3] for last- mile delivery, where we have a set of ...