Refine
Year of publication
Document Type
- Article (51)
- Other (36)
- Monograph/Edited Volume (29)
- Conference Proceeding (4)
- Postprint (2)
- Part of a Book (1)
- Report (1)
Keywords
- MOOC (10)
- digital education (8)
- e-learning (8)
- Cloud Computing (7)
- E-Learning (7)
- openHPI (7)
- Onlinekurs (6)
- MOOCs (5)
- Identitätsmanagement (4)
- Security (4)
- cloud (4)
- cloud computing (4)
- digitale Bildung (4)
- identity management (4)
- online course creation (4)
- online course design (4)
- Cloud-Security (3)
- Digitale Bildung (3)
- Forschungsprojekte (3)
- Future SOC Lab (3)
- In-Memory Technologie (3)
- Kursdesign (3)
- Micro Degree (3)
- Multicore Architekturen (3)
- Online-Lehre (3)
- Online-Lernen (3)
- Onlinekurs-Produktion (3)
- Privacy (3)
- Security Metrics (3)
- Security Risk Assessment (3)
- Social Media Analysis (3)
- Teamwork (3)
- Tele-Lab (3)
- Tele-Teaching (3)
- course design (3)
- maschinelles Lernen (3)
- micro degree (3)
- micro-credential (3)
- online teaching (3)
- tele-TASK (3)
- ACINQ (2)
- ASIC (2)
- Australian securities exchange (2)
- BCCC (2)
- BTC (2)
- BitShares (2)
- Bitcoin Core (2)
- Blockchain Auth (2)
- Blockchain-Konsortium R3 (2)
- Blockkette (2)
- Blockstack (2)
- Blockstack ID (2)
- Blumix-Plattform (2)
- Blöcke (2)
- Byzantine Agreement (2)
- Cloud (2)
- Colored Coins (2)
- DAO (2)
- DPoS (2)
- Delegated Proof-of-Stake (2)
- Digitalisierung (2)
- Distributed Proof-of-Research (2)
- E-Wallet (2)
- ECDSA (2)
- Energy (2)
- Eris (2)
- Ether (2)
- Ethereum (2)
- European Union (2)
- Europäische Union (2)
- Federated Byzantine Agreement (2)
- FollowMyVote (2)
- Fork (2)
- Forschungskolleg (2)
- Gridcoin (2)
- HPI Schul-Cloud (2)
- Hard Fork (2)
- Hashed Timelock Contracts (2)
- Hasso Plattner Institute (2)
- Hasso-Plattner-Institut (2)
- IT-Infrastruktur (2)
- IT-infrastructure (2)
- Internet der Dinge (2)
- Internet of Things (2)
- IoT (2)
- Japanese Blockchain Consortium (2)
- Japanisches Blockchain-Konsortium (2)
- Java (2)
- Kette (2)
- Klausurtagung (2)
- Konsensalgorithmus (2)
- Konsensprotokoll (2)
- Lecture Video Archive (2)
- Lightning Network (2)
- Lock-Time-Parameter (2)
- MAC security (2)
- MERLOT (2)
- Machine Learning (2)
- Massive Open Online Course (MOOC) (2)
- Micropayment-Kanäle (2)
- Microsoft Azur (2)
- NASDAQ (2)
- NameID (2)
- Namecoin (2)
- Off-Chain-Transaktionen (2)
- Onename (2)
- Online Course (2)
- Online-Learning (2)
- OpenBazaar (2)
- Oracles (2)
- Orphan Block (2)
- P2P (2)
- Peer-to-Peer Netz (2)
- Peercoin (2)
- PoB (2)
- PoS (2)
- PoW (2)
- Proof-of-Burn (2)
- Proof-of-Stake (2)
- Proof-of-Work (2)
- Ripple (2)
- SCP (2)
- SHA (2)
- SPV (2)
- Schule (2)
- Schwierigkeitsgrad (2)
- Secure Configuration (2)
- Service-oriented Systems Engineering (2)
- Simplified Payment Verification (2)
- Skalierbarkeit der Blockchain (2)
- Slock.it (2)
- Soft Fork (2)
- Steemit (2)
- Stellar Consensus Protocol (2)
- Storj (2)
- Studie (2)
- The Bitfury Group (2)
- The DAO (2)
- Transaktion (2)
- Two-Way-Peg (2)
- Unspent Transaction Output (2)
- Verträge (2)
- Virtual Machine (2)
- Watson IoT (2)
- Zielvorgabe (2)
- Zookos Dreieck (2)
- Zookos triangle (2)
- altchain (2)
- alternative chain (2)
- artifical intelligence (2)
- assignments (2)
- atomic swap (2)
- authentication (2)
- bidirectional payment channels (2)
- bitcoins (2)
- blockchain (2)
- blockchain consortium (2)
- blockchain-übergreifend (2)
- blocks (2)
- blumix platform (2)
- chain (2)
- confirmation period (2)
- consensus algorithm (2)
- consensus protocol (2)
- contest period (2)
- contracts (2)
- cross-chain (2)
- decentralized autonomous organization (2)
- design thinking (2)
- dezentrale autonome Organisation (2)
- difficulty (2)
- difficulty target (2)
- digital enlightenment (2)
- digital identity (2)
- digital learning platform (2)
- digital sovereignty (2)
- digitale Aufklärung (2)
- digitale Lernplattform (2)
- digitale Souveränität (2)
- digitalization (2)
- doppelter Hashwert (2)
- double hashing (2)
- federated voting (2)
- flexibility (2)
- framework (2)
- hashrate (2)
- innovation (2)
- intelligente Verträge (2)
- inter-chain (2)
- knowledge management (2)
- künstliche Intelligenz (2)
- learning path (2)
- lebenslanges Lernen (2)
- ledger assets (2)
- lifelong learning (2)
- machine learning (2)
- merged mining (2)
- merkle root (2)
- micropayment (2)
- micropayment channels (2)
- miner (2)
- mining (2)
- mining hardware (2)
- minting (2)
- modularization (2)
- multicore architectures (2)
- nonce (2)
- off-chain transaction (2)
- peer-to-peer network (2)
- pegged sidechains (2)
- quorum slices (2)
- research projects (2)
- rootstock (2)
- scalability of blockchain (2)
- scarce tokens (2)
- self-paced learning (2)
- self-sovereign identity (2)
- sidechain (2)
- smart contracts (2)
- smartphone (2)
- tele-teaching (2)
- transaction (2)
- AI Lab (1)
- Abschlussbericht (1)
- Algorithms (1)
- Angriffe (1)
- Anomaly detection (1)
- Anwendungsvirtualisierung (1)
- Application Container Security (1)
- Approximation algorithms (1)
- Architectures (1)
- Attention span (1)
- Attribute aggregation (1)
- Authentication (1)
- Authentifizierung (1)
- Automated parsing (1)
- Bandwidth (1)
- Basic Storage Anbieter (1)
- Big Five Model (1)
- Big Five model (1)
- Biometrie (1)
- Blockchain (1)
- Blockchains (1)
- Bot Detection (1)
- Brand Personality (1)
- Change Management (1)
- Cloud Audit (1)
- Cloud Native Applications (1)
- Cloud Service Provider (1)
- Cloud Storage Broker (1)
- Cloud access control and resource management (1)
- Collaborative learning (1)
- Computer-assisted instruction (1)
- Confusion matrix (1)
- Correlation (1)
- Cross-modal retrieval (1)
- Crowd-Resourcing (1)
- Data breach (1)
- Data mining (1)
- Data mining Machine learning (1)
- Data models (1)
- Data partitioning (1)
- Data profiling (1)
- Datenschutz (1)
- Datenschutz-sicherer Einsatz in der Schule (1)
- Deep learning (1)
- Deep neural networks (1)
- Denial of sleep (1)
- Design Thinking (1)
- Disadvantaged communities (1)
- Distance Learning (1)
- Distributed snapshot algorithm (1)
- E-Learning exam preparation (1)
- E-Lecture (1)
- E-health (1)
- Educational Technology (1)
- Electrical products (1)
- Electronic prescription (1)
- Embedded Programming (1)
- Emotion Mining (1)
- Energy-aware (1)
- Event normalization (1)
- Event processing (1)
- FIDO (1)
- Feedback control loop (1)
- Flash (1)
- Forecasting (1)
- Fuzzy logic (1)
- Gamification (1)
- German schools (1)
- Graph Convolutional Neural Networks (1)
- Graph Embedding (1)
- Grid stability (1)
- HITS (1)
- HLS (1)
- HMM (1)
- HPI Forschung (1)
- HPI research (1)
- HTML5 (1)
- Home appliances (1)
- ICT (1)
- IDS (1)
- IDS management (1)
- IEEE 802.15.4 (1)
- Identity Management (1)
- Identity leak (1)
- Identity management systems (1)
- Identität (1)
- Imbalanced medical image semantic segmentation (1)
- In-Memory technology (1)
- In-memory (1)
- Incubator (1)
- Innovation (1)
- Innovationsmanagement (1)
- Innovationsmethode (1)
- Integrity Verification (1)
- Internet (1)
- Internet of things (1)
- Interviews (1)
- Intrusion detection (1)
- Inventory systems (1)
- K-12 (1)
- KI-Labor (1)
- Künstliche Intelligenz (1)
- LSTM (1)
- Leadership (1)
- Learning behavior (1)
- Least privilege principle (1)
- Lecture Recording (1)
- Lecture video recording (1)
- Licenses (1)
- Link layer security (1)
- Load modeling (1)
- Lossy networks (1)
- Low-processing capable devices (1)
- MOOC Remote Lab (1)
- Machine learning (1)
- Management (1)
- Marktübersicht (1)
- Massive Open Online Courses (1)
- Mehr-Faktor-Authentifizierung (1)
- Meltdown (1)
- Memory Dumping (1)
- Micro-grid networks (1)
- Microservices Security (1)
- Mobile Learning (1)
- Mobiles (1)
- Model-driven SOA Security (1)
- Modell-getriebene SOA-Sicherheit (1)
- Monitoring (1)
- Moving Target Defense (1)
- Multimodal representation (1)
- Natural Language Processing (1)
- Network graph (1)
- Network monitoring (1)
- Network topology (1)
- Neural Networks (1)
- OAuth (1)
- Offline-Enabled (1)
- OpenID Connect (1)
- Orchestration (1)
- Organisationsveränderung (1)
- Outlier detection (1)
- Parallel processing (1)
- Peer Assessment (1)
- Peer assessment (1)
- Personality Prediction (1)
- Ph.D. Retreat (1)
- Ph.D. retreat (1)
- Power consumption characterization (1)
- Power demand (1)
- Prediction (1)
- Preterm (1)
- Privilege separation concept (1)
- Programming (1)
- Programming course (1)
- Project-based learning (1)
- Protocols (1)
- Psychological Emotions (1)
- Python (1)
- Recurrent generative (1)
- Remote patient monitoring (1)
- Research School (1)
- Resource constrained smart micro-grids (1)
- Resource description framework (1)
- Resource management (1)
- Robust optimization (1)
- Role-based access control (1)
- SAP HANA (1)
- SOA Security (1)
- SOA Sicherheit (1)
- School (1)
- Secondary Education (1)
- Secure Digital Identities (1)
- Secure Enterprise SOA (1)
- Security analytics (1)
- Security-as-a-Service (1)
- Semantic feature (1)
- Sensor networks (1)
- Service detection (1)
- Sichere Digitale Identitäten (1)
- Single-Sign-On (1)
- Smart Home Education (1)
- Smart micro-grids (1)
- Software (1)
- Spectre (1)
- Team Assessment (1)
- Team based assignment (1)
- Team-based Learning (1)
- Technology enhanced learning (1)
- Threat Models (1)
- Trust Management (1)
- Ubiquitous (1)
- Unified cloud model (1)
- Unified logging system (1)
- Unterricht mit digitalen Medien (1)
- Video annotations (1)
- Virtual Desktop Infrastructure (1)
- Virtualisierung (1)
- Virtualization (1)
- Vulnerability Assessment (1)
- Vulnerability analysis (1)
- Wireless sensor networks (1)
- abdominal imaging (1)
- accuracy (1)
- activities (1)
- adoption (1)
- adversarial network (1)
- application virtualization (1)
- argumentation research (1)
- attack graph (1)
- attribute assurance (1)
- bachelor project (1)
- basic cloud storage services (1)
- behavior psychotherapy (1)
- behavioral (1)
- biometrics (1)
- brand personality (1)
- change management (1)
- cloud monitoring (1)
- cloud security (1)
- cognition (1)
- cognitive patterns (1)
- collaboration (1)
- collaborative learning (1)
- collaborative tagging (1)
- collaborative work (1)
- collective intelligence (1)
- computer science (1)
- computer science education (1)
- computer-mediated therapy (1)
- content gamification (1)
- continuous (1)
- creativity (1)
- cyber humanistic (1)
- data integration (1)
- developing countries (1)
- diffusion (1)
- digital unterstützter Unterricht (1)
- digitale Infrastruktur für den Schulunterricht (1)
- distributed ledger technology (1)
- e-Learning (1)
- e-lecture (1)
- eLectures (1)
- education (1)
- emotion measurement (1)
- experience (1)
- expertise (1)
- final report (1)
- folksonomy (1)
- gait (1)
- gameful learning (1)
- generative multi-discriminative networks (1)
- healthcare (1)
- higher education (1)
- human-computer interaction (1)
- identity (1)
- identity broker (1)
- image captioning (1)
- imbalanced learning (1)
- in-memory technology (1)
- innovation capabilities (1)
- innovation management (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- knowledge building (1)
- leadership (1)
- learner engagement (1)
- learning (1)
- learning styles (1)
- link layer security (1)
- machine (1)
- management (1)
- market study (1)
- measurement (1)
- medical documentation (1)
- medical identity theft (1)
- memory-based clustering (1)
- memory-based correlation (1)
- memory-based databases (1)
- metacognition (1)
- microcredential (1)
- multi factor authentication (1)
- multi-core (1)
- multimodal representations (1)
- mutli-task learning (1)
- narrative (1)
- note-taking (1)
- one-time password (1)
- online course (1)
- online-learning (1)
- organizational change (1)
- personality prediction (1)
- phishing (1)
- programming (1)
- project based learning (1)
- public cloud storage services (1)
- ranking (1)
- rekeying (1)
- research school (1)
- resilient architectures (1)
- school (1)
- security analytics (1)
- security chaos engineering (1)
- security risk assessment (1)
- segmentation (1)
- self-government (1)
- semantic (1)
- service-oriented systems engineering (1)
- social media analysis (1)
- spamming (1)
- steganography (1)
- storytelling (1)
- study (1)
- teamwork (1)
- tele-lab (1)
- telework (1)
- thinking styles (1)
- trust (1)
- trust model (1)
- user experience (1)
- verification (1)
- video annotation (1)
- virtual desktop infrastructure (1)
- virtual groups (1)
- virtualization (1)
- wearables (1)
- öffentliche Cloud Speicherdienste (1)
Detect me if you can
(2019)
Spam Bots have become a threat to online social networks with their malicious behavior, posting misinformation messages and influencing online platforms to fulfill their motives. As spam bots have become more advanced over time, creating algorithms to identify bots remains an open challenge. Learning low-dimensional embeddings for nodes in graph structured data has proven to be useful in various domains. In this paper, we propose a model based on graph convolutional neural networks (GCNN) for spam bot detection. Our hypothesis is that to better detect spam bots, in addition to defining a features set, the social graph must also be taken into consideration. GCNNs are able to leverage both the features of a node and aggregate the features of a node’s neighborhood. We compare our approach, with two methods that work solely on a features set and on the structure of the graph. To our knowledge, this work is the first attempt of using graph convolutional neural networks in spam bot detection.