Refine
Year of publication
Document Type
- Article (50)
- Other (35)
- Monograph/Edited Volume (13)
- Conference Proceeding (4)
- Postprint (2)
- Part of a Book (1)
Language
- English (105) (remove)
Keywords
- MOOC (9)
- e-learning (7)
- Cloud Computing (5)
- E-Learning (5)
- digital education (5)
- Onlinekurs (4)
- Security (4)
- online course creation (4)
- online course design (4)
- Cloud-Security (3)
- Digitale Bildung (3)
- Forschungsprojekte (3)
- Future SOC Lab (3)
- In-Memory Technologie (3)
- Kursdesign (3)
- MOOCs (3)
- Micro Degree (3)
- Multicore Architekturen (3)
- Online-Lehre (3)
- Onlinekurs-Produktion (3)
- Security Metrics (3)
- Security Risk Assessment (3)
- Social Media Analysis (3)
- Teamwork (3)
- course design (3)
- maschinelles Lernen (3)
- micro degree (3)
- micro-credential (3)
- online teaching (3)
- openHPI (3)
- Energy (2)
- Forschungskolleg (2)
- Hasso Plattner Institute (2)
- Hasso-Plattner-Institut (2)
- Java (2)
- Klausurtagung (2)
- Lecture Video Archive (2)
- MAC security (2)
- Machine Learning (2)
- Massive Open Online Course (MOOC) (2)
- Privacy (2)
- Secure Configuration (2)
- Service-oriented Systems Engineering (2)
- Virtual Machine (2)
- artifical intelligence (2)
- assignments (2)
- cloud computing (2)
- design thinking (2)
- digital identity (2)
- flexibility (2)
- framework (2)
- identity management (2)
- innovation (2)
- knowledge management (2)
- künstliche Intelligenz (2)
- learning path (2)
- machine learning (2)
- modularization (2)
- multicore architectures (2)
- research projects (2)
- self-paced learning (2)
- self-sovereign identity (2)
- ACINQ (1)
- ASIC (1)
- Algorithms (1)
- Anomaly detection (1)
- Application Container Security (1)
- Approximation algorithms (1)
- Architectures (1)
- Attention span (1)
- Attribute aggregation (1)
- Australian securities exchange (1)
- Authentication (1)
- Automated parsing (1)
- BCCC (1)
- BTC (1)
- Bandwidth (1)
- Big Five Model (1)
- Big Five model (1)
- BitShares (1)
- Bitcoin Core (1)
- Blockchain (1)
- Blockchain Auth (1)
- Blockchain-Konsortium R3 (1)
- Blockchains (1)
- Blockkette (1)
- Blockstack (1)
- Blockstack ID (1)
- Blumix-Plattform (1)
- Blöcke (1)
- Bot Detection (1)
- Brand Personality (1)
- Byzantine Agreement (1)
- Change Management (1)
- Cloud Audit (1)
- Cloud Native Applications (1)
- Cloud Service Provider (1)
- Cloud Storage Broker (1)
- Cloud access control and resource management (1)
- Collaborative learning (1)
- Colored Coins (1)
- Computer-assisted instruction (1)
- Confusion matrix (1)
- Correlation (1)
- Cross-modal retrieval (1)
- Crowd-Resourcing (1)
- DAO (1)
- DPoS (1)
- Data breach (1)
- Data mining (1)
- Data mining Machine learning (1)
- Data models (1)
- Data partitioning (1)
- Data profiling (1)
- Deep learning (1)
- Deep neural networks (1)
- Delegated Proof-of-Stake (1)
- Denial of sleep (1)
- Design Thinking (1)
- Digitalisierung (1)
- Disadvantaged communities (1)
- Distance Learning (1)
- Distributed Proof-of-Research (1)
- Distributed snapshot algorithm (1)
- E-Learning exam preparation (1)
- E-Lecture (1)
- E-Wallet (1)
- E-health (1)
- ECDSA (1)
- Educational Technology (1)
- Electrical products (1)
- Electronic prescription (1)
- Embedded Programming (1)
- Emotion Mining (1)
- Energy-aware (1)
- Eris (1)
- Ether (1)
- Ethereum (1)
- European Union (1)
- Europäische Union (1)
- Event normalization (1)
- Event processing (1)
- Federated Byzantine Agreement (1)
- Feedback control loop (1)
- Flash (1)
- FollowMyVote (1)
- Forecasting (1)
- Fork (1)
- Fuzzy logic (1)
- Gamification (1)
- Graph Convolutional Neural Networks (1)
- Graph Embedding (1)
- Grid stability (1)
- Gridcoin (1)
- HITS (1)
- HLS (1)
- HMM (1)
- HPI Schul-Cloud (1)
- HTML5 (1)
- Hard Fork (1)
- Hashed Timelock Contracts (1)
- Home appliances (1)
- ICT (1)
- IDS (1)
- IDS management (1)
- IEEE 802.15.4 (1)
- Identity leak (1)
- Identity management systems (1)
- Identitätsmanagement (1)
- Imbalanced medical image semantic segmentation (1)
- In-Memory technology (1)
- In-memory (1)
- Incubator (1)
- Innovation (1)
- Innovationsmanagement (1)
- Innovationsmethode (1)
- Integrity Verification (1)
- Internet (1)
- Internet der Dinge (1)
- Internet of Things (1)
- Internet of things (1)
- Interviews (1)
- Intrusion detection (1)
- Inventory systems (1)
- IoT (1)
- Japanese Blockchain Consortium (1)
- Japanisches Blockchain-Konsortium (1)
- K-12 (1)
- Kette (1)
- Konsensalgorithmus (1)
- Konsensprotokoll (1)
- Künstliche Intelligenz (1)
- LSTM (1)
- Leadership (1)
- Learning behavior (1)
- Least privilege principle (1)
- Lecture Recording (1)
- Lecture video recording (1)
- Licenses (1)
- Lightning Network (1)
- Link layer security (1)
- Load modeling (1)
- Lock-Time-Parameter (1)
- Lossy networks (1)
- Low-processing capable devices (1)
- MERLOT (1)
- MOOC Remote Lab (1)
- Machine learning (1)
- Management (1)
- Massive Open Online Courses (1)
- Meltdown (1)
- Memory Dumping (1)
- Micro-grid networks (1)
- Micropayment-Kanäle (1)
- Microservices Security (1)
- Microsoft Azur (1)
- Mobile Learning (1)
- Mobiles (1)
- Monitoring (1)
- Moving Target Defense (1)
- Multimodal representation (1)
- NASDAQ (1)
- NameID (1)
- Namecoin (1)
- Natural Language Processing (1)
- Network graph (1)
- Network monitoring (1)
- Network topology (1)
- Neural Networks (1)
- Off-Chain-Transaktionen (1)
- Offline-Enabled (1)
- Onename (1)
- Online Course (1)
- Online-Learning (1)
- Online-Lernen (1)
- OpenBazaar (1)
- Oracles (1)
- Orchestration (1)
- Organisationsveränderung (1)
- Orphan Block (1)
- Outlier detection (1)
- P2P (1)
- Parallel processing (1)
- Peer Assessment (1)
- Peer assessment (1)
- Peer-to-Peer Netz (1)
- Peercoin (1)
- Personality Prediction (1)
- Ph.D. Retreat (1)
- Ph.D. retreat (1)
- PoB (1)
- PoS (1)
- PoW (1)
- Power consumption characterization (1)
- Power demand (1)
- Prediction (1)
- Preterm (1)
- Privilege separation concept (1)
- Programming (1)
- Programming course (1)
- Project-based learning (1)
- Proof-of-Burn (1)
- Proof-of-Stake (1)
- Proof-of-Work (1)
- Protocols (1)
- Psychological Emotions (1)
- Python (1)
- Recurrent generative (1)
- Remote patient monitoring (1)
- Research School (1)
- Resource constrained smart micro-grids (1)
- Resource description framework (1)
- Resource management (1)
- Ripple (1)
- Robust optimization (1)
- Role-based access control (1)
- SAP HANA (1)
- SCP (1)
- SHA (1)
- SPV (1)
- School (1)
- Schwierigkeitsgrad (1)
- Secondary Education (1)
- Security analytics (1)
- Security-as-a-Service (1)
- Semantic feature (1)
- Sensor networks (1)
- Service detection (1)
- Simplified Payment Verification (1)
- Skalierbarkeit der Blockchain (1)
- Slock.it (1)
- Smart Home Education (1)
- Smart micro-grids (1)
- Soft Fork (1)
- Software (1)
- Spectre (1)
- Steemit (1)
- Stellar Consensus Protocol (1)
- Storj (1)
- Studie (1)
- Team Assessment (1)
- Team based assignment (1)
- Team-based Learning (1)
- Technology enhanced learning (1)
- Tele-Lab (1)
- Tele-Teaching (1)
- The Bitfury Group (1)
- The DAO (1)
- Threat Models (1)
- Transaktion (1)
- Two-Way-Peg (1)
- Ubiquitous (1)
- Unified cloud model (1)
- Unified logging system (1)
- Unspent Transaction Output (1)
- Verträge (1)
- Video annotations (1)
- Virtualization (1)
- Vulnerability Assessment (1)
- Vulnerability analysis (1)
- Watson IoT (1)
- Wireless sensor networks (1)
- Zielvorgabe (1)
- Zookos Dreieck (1)
- Zookos triangle (1)
- abdominal imaging (1)
- accuracy (1)
- activities (1)
- adoption (1)
- adversarial network (1)
- altchain (1)
- alternative chain (1)
- argumentation research (1)
- atomic swap (1)
- attack graph (1)
- attribute assurance (1)
- authentication (1)
- bachelor project (1)
- behavior psychotherapy (1)
- behavioral (1)
- bidirectional payment channels (1)
- bitcoins (1)
- blockchain (1)
- blockchain consortium (1)
- blockchain-übergreifend (1)
- blocks (1)
- blumix platform (1)
- brand personality (1)
- chain (1)
- change management (1)
- cloud (1)
- cloud monitoring (1)
- cloud security (1)
- cognition (1)
- cognitive patterns (1)
- collaboration (1)
- collaborative learning (1)
- collaborative tagging (1)
- collaborative work (1)
- collective intelligence (1)
- computer science (1)
- computer science education (1)
- computer-mediated therapy (1)
- confirmation period (1)
- consensus algorithm (1)
- consensus protocol (1)
- content gamification (1)
- contest period (1)
- continuous (1)
- contracts (1)
- creativity (1)
- cross-chain (1)
- cyber humanistic (1)
- data integration (1)
- decentralized autonomous organization (1)
- developing countries (1)
- dezentrale autonome Organisation (1)
- difficulty (1)
- difficulty target (1)
- diffusion (1)
- digital enlightenment (1)
- digital learning platform (1)
- digital sovereignty (1)
- digitale Aufklärung (1)
- digitale Bildung (1)
- digitale Lernplattform (1)
- digitale Souveränität (1)
- digitalization (1)
- distributed ledger technology (1)
- doppelter Hashwert (1)
- double hashing (1)
- e-Learning (1)
- e-lecture (1)
- eLectures (1)
- education (1)
- emotion measurement (1)
- experience (1)
- expertise (1)
- federated voting (1)
- folksonomy (1)
- gait (1)
- gameful learning (1)
- generative multi-discriminative networks (1)
- hashrate (1)
- healthcare (1)
- higher education (1)
- human-computer interaction (1)
- identity broker (1)
- image captioning (1)
- imbalanced learning (1)
- in-memory technology (1)
- innovation capabilities (1)
- innovation management (1)
- intelligente Verträge (1)
- inter-chain (1)
- key establishment (1)
- key management (1)
- key revocation (1)
- knowledge building (1)
- leadership (1)
- learner engagement (1)
- learning (1)
- learning styles (1)
- lebenslanges Lernen (1)
- ledger assets (1)
- lifelong learning (1)
- link layer security (1)
- machine (1)
- management (1)
- measurement (1)
- medical documentation (1)
- medical identity theft (1)
- memory-based clustering (1)
- memory-based correlation (1)
- memory-based databases (1)
- merged mining (1)
- merkle root (1)
- metacognition (1)
- microcredential (1)
- micropayment (1)
- micropayment channels (1)
- miner (1)
- mining (1)
- mining hardware (1)
- minting (1)
- multi-core (1)
- multimodal representations (1)
- mutli-task learning (1)
- narrative (1)
- nonce (1)
- note-taking (1)
- off-chain transaction (1)
- one-time password (1)
- organizational change (1)
- peer-to-peer network (1)
- pegged sidechains (1)
- personality prediction (1)
- phishing (1)
- programming (1)
- project based learning (1)
- quorum slices (1)
- ranking (1)
- rekeying (1)
- research school (1)
- resilient architectures (1)
- rootstock (1)
- scalability of blockchain (1)
- scarce tokens (1)
- security analytics (1)
- security chaos engineering (1)
- security risk assessment (1)
- segmentation (1)
- self-government (1)
- semantic (1)
- service-oriented systems engineering (1)
- sidechain (1)
- smart contracts (1)
- smartphone (1)
- social media analysis (1)
- spamming (1)
- steganography (1)
- storytelling (1)
- study (1)
- teamwork (1)
- tele-TASK (1)
- tele-teaching (1)
- telework (1)
- thinking styles (1)
- transaction (1)
- trust (1)
- trust model (1)
- user experience (1)
- verification (1)
- video annotation (1)
- virtual groups (1)
Detect me if you can
(2019)
Spam Bots have become a threat to online social networks with their malicious behavior, posting misinformation messages and influencing online platforms to fulfill their motives. As spam bots have become more advanced over time, creating algorithms to identify bots remains an open challenge. Learning low-dimensional embeddings for nodes in graph structured data has proven to be useful in various domains. In this paper, we propose a model based on graph convolutional neural networks (GCNN) for spam bot detection. Our hypothesis is that to better detect spam bots, in addition to defining a features set, the social graph must also be taken into consideration. GCNNs are able to leverage both the features of a node and aggregate the features of a node’s neighborhood. We compare our approach, with two methods that work solely on a features set and on the structure of the graph. To our knowledge, this work is the first attempt of using graph convolutional neural networks in spam bot detection.