Export Citations
No abstract available.
Proceeding Downloads
A Target-Oriented Conflict Graph-based Approach for the Coverage Problem in Directional Sensor Networks
Maximizing target coverage with minimum number of sensors is an elementary problem in the area of wireless sensor networks which has many applications in monitoring, tracking, security, and surveillance systems. The recent increase in the use of ...
Hole Healing in Mobile Sensor Network
In a sensor network, the occurrence of coverage hole in the system is quite natural. The most common technique used to heal such a hole is to deploy sensors densely. Some of these sensors remain active and covers the whole target area and the remaining ...
”A Tale on Abuse and Its Detection over Online Platforms, Especially over Emails”: From the Context of Bangladesh
With the advent of pervasive usage of online platforms, online abusive behavior has become an indispensable part of our life demanding great attention from the research community. Accordingly, the research community is spending its effort on the ...
Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis
As the number of Internet of Things (IoT) devices proliferate, an in-depth understanding of the IoT attack surface has become quintessential for dealing with the security and reliability risks. IoT devices and components execute implementations of ...
Securing Firearms inside An Arsenal through Using A Remotely-Operated Sensor-Based Safety Mechanism
Keeping firearms inside an arsenal with adequate safety is one of the prime concerns of the research community considering limitless damage in case of falling the firearms to the stain accused or rogue peoples in the society. In this regard, a remotely-...
Balancing Worker Utility and Recruitment Cost in Spatial Crowdsensing: A Nash Game Approach
Leveraging the power of mobile crowdsensing (MCS) to achieve unparalleled coverage of tasks by utilizing the crucial spatio-temporal co-relation between the workers and tasks results in the distributed sensing system named spatio-temporal crowdsensing ...
Fault-Tolerant Covering Points by UAVs
Unmanned Aerial vehicles (UAVs) or Drones crash due to power failure, communication failure, mechanical malfunction, or Cyber-Physical attacks. This paper aims to study fault-tolerant covering by UAVs, i.e., in case of failure of some UAVs, other ...
A Low-Cost IoT Based Automatic Water Quality Monitoring System for Textile Industry
- Avishek Das Gupta,
- Zafar Sadek,
- Md. Harunur Rashid Bhuiyan,
- Md. Golam Kibria,
- Tarik Reza Toha,
- Shaikh Md. Mominul Alam
Water is one of the most vital elements for livelihood but at the same time, it is polluted by different kinds of fastest-growing industries like textiles, leather, sugar, etc. The textile industry is one of the most water-consuming sectors in ...
Devising a Dust and Noise Pollution Monitoring System for Textile Industry
- Ashish Sutradhar,
- Md. Harunur Rashid Bhuiyan,
- Faria Tashnim Mazumder,
- Pritom Goswami,
- Saiful Islam Salim,
- Tarik Reza Toha,
- Shaikh Md. Mominul Alam
Textile industry is one of the most labor-intensive manufacturing sectors in developing countries such as Bangladesh, India, Pakistan, etc. During the manufacturing process, the textile machinery produces a high concentration of cotton dust as well as ...
Cloud Pattern Classification for Rainfall Prediction using Convolutional Neural Network
Rainfall prediction is an important research topic because of its wide range of applications in disaster and agricultural communities. It depends on several features of earth's atmosphere such as cloud information, speed and direction of wind, ...
Determining Confused Brain Activity from EEG Sensor Signals
Human brain, being the most remarkable logic processing unit, sometimes fails to act properly. Often the task at hand becomes too cumbersome for the brain to perceive, which is known as confusion in simple terms. In some certain critical moments, it is ...
AI-powered Network Security: Approaches and Research Directions
Networks are today a critical infrastructure. Their resilience against attacks is thus crucial. Protecting networks requires a comprehensive security life-cycle and the deployment of different protection techniques. To make defenses more effective, ...
MGD: A Utility Metric for Private Data Publication
Differential privacy has been accepted as one of the most popular techniques to protect user data privacy. A common way for utilizing private data under DP is to take an input dataset and synthesize a new dataset that preserves features of the input ...
Improving Safety in Cyber Enabled Underground Mines
Numerous underground mine accidents in the past worldwide highlight the importance and urgent need for safer, more effective, and more reliable mine safety procedures and regulations. Ensuring the safety of miners in underground mine environments is ...
From Schedules to Programs — Reimagining Networking Infrastructure for Future Cyber-Physical Systems
Future cyber-physical systems will require higher capacity, meet more stringent real-time requirements, and adapt quickly to a broader range of network dynamics. However, the traditional approach of using fixed schedules to drive the operation of ...
Index Terms
- Proceedings of the 8th International Conference on Networking, Systems and Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
NSysS '19 | 44 | 12 | 27% |
Overall | 44 | 12 | 27% |