LEADER 04101nam 22006135 450 001 9910864190803321 005 20240702113330.0 010 $a3-031-59933-0 024 7 $a10.1007/978-3-031-59933-0 035 $a(MiAaPQ)EBC31356403 035 $a(Au-PeEL)EBL31356403 035 $a(CKB)32200188700041 035 $a(DE-He213)978-3-031-59933-0 035 $a(MiAaPQ)EBC31574325 035 $a(Au-PeEL)EBL31574325 035 $a(EXLCZ)9932200188700041 100 $a20240528d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMachine Learning for Networking $e6th International Conference, MLN 2023, Paris, France, November 28?30, 2023, Revised Selected Papers /$fedited by Éric Renault, Selma Boumerdassi, Paul Mühlethaler 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (296 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14525 311 $a3-031-59932-2 327 $a -- Machine Learning for IoT Devices Security Reinforcement. -- All Attentive Deep Conditional Graph Generation for Wireless Network Topology Optimization. -- Enhancing Social Media Profile Authenticity Detection A Bio Inspired Algorithm Approach. -- Deep Learning Based Detection of Suspicious Activity in Outdoor Home Surveillance. -- Detecting Abnormal Authentication Delays in Identity and Access Management using Machine Learning. -- SIP DDoS SIP Framework for DDoS Intrusion Detection based on Recurrent Neural Networks. -- Deep Reinforcement Learning for multiobjective Scheduling in Industry 5.0 Reconfigurable Manufacturing Systems. -- Toward a digital twin IoT for the validation of AI algorithms in smart-city applications. -- Data Summarization for Federated Learning. -- ML Comparison Countermeasure prediction using radio internal metrics for BLE radio. -- Towards to Road Profiling with Cooperative Intelligent TransportSystems. -- Study of Masquerade Attack in VANETs with machine learning. -- Detecting Virtual Harassment in Social Media Using Machine Learning. -- Leverage data security policies complexity for users an end to end storage service management in the Cloud based on ABAC attributes. -- Machine Learning to Model the Risk of Alteration of historical buildings. -- A novel Image Encryption Technique using Modified Grain. -- Transformation Network Model for Ear Recognition. -- Cybersecurity analytics: Toward an efficient ML-based Network Intrusion Detection System (NIDS). 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Machine Learning for Networking, MLN 2023, held in Paris, France, during November 28?30, 2023. The 18 full papers included in this book were carefully reviewed and selected from 34 submissions. The conference aims at providing a top forum for researchers and practitioners to present and discuss new trends in machine learning, deep learning, pattern recognition and optimization for network architectures and services. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14525 606 $aData mining 606 $aComputer networks 606 $aApplication software 606 $aData Mining and Knowledge Discovery 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData mining. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData Mining and Knowledge Discovery. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a6,312 700 $aRenault$b Éric$0128132 701 $aBoumerdassi$b Selma$01029450 701 $aMühlethaler$b Paul$081118 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910864190803321 996 $aMachine Learning for Networking$94165666 997 $aUNINA