skip to main content
10.1145/3491371acmotherconferencesBook PagePublication PagesnsyssConference Proceedingsconference-collections
NSysS '21: Proceedings of the 8th International Conference on Networking, Systems and Security
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
8th NSysS 2021: 8th International Conference on Networking, Systems and Security Cox's Bazar Bangladesh December 21 - 23, 2021
ISBN:
978-1-4503-8737-8
Published:
21 December 2021
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 01 Mar 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Networking and Security
research-article
A Target-Oriented Conflict Graph-based Approach for the Coverage Problem in Directional Sensor Networks

Maximizing target coverage with minimum number of sensors is an elementary problem in the area of wireless sensor networks which has many applications in monitoring, tracking, security, and surveillance systems. The recent increase in the use of ...

short-paper
Hole Healing in Mobile Sensor Network

In a sensor network, the occurrence of coverage hole in the system is quite natural. The most common technique used to heal such a hole is to deploy sensors densely. Some of these sensors remain active and covers the whole target area and the remaining ...

research-article
”A Tale on Abuse and Its Detection over Online Platforms, Especially over Emails”: From the Context of Bangladesh

With the advent of pervasive usage of online platforms, online abusive behavior has become an indispensable part of our life demanding great attention from the research community. Accordingly, the research community is spending its effort on the ...

SESSION: Software and Systems Security
research-article
Public Access
Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis

As the number of Internet of Things (IoT) devices proliferate, an in-depth understanding of the IoT attack surface has become quintessential for dealing with the security and reliability risks. IoT devices and components execute implementations of ...

research-article
Securing Firearms inside An Arsenal through Using A Remotely-Operated Sensor-Based Safety Mechanism

Keeping firearms inside an arsenal with adequate safety is one of the prime concerns of the research community considering limitless damage in case of falling the firearms to the stain accused or rogue peoples in the society. In this regard, a remotely-...

SESSION: Autonomous and Distributed Systems
research-article
Balancing Worker Utility and Recruitment Cost in Spatial Crowdsensing: A Nash Game Approach

Leveraging the power of mobile crowdsensing (MCS) to achieve unparalleled coverage of tasks by utilizing the crucial spatio-temporal co-relation between the workers and tasks results in the distributed sensing system named spatio-temporal crowdsensing ...

short-paper
Fault-Tolerant Covering Points by UAVs

Unmanned Aerial vehicles (UAVs) or Drones crash due to power failure, communication failure, mechanical malfunction, or Cyber-Physical attacks. This paper aims to study fault-tolerant covering by UAVs, i.e., in case of failure of some UAVs, other ...

SESSION: IoT and Embedded Systems
research-article
A Low-Cost IoT Based Automatic Water Quality Monitoring System for Textile Industry

Water is one of the most vital elements for livelihood but at the same time, it is polluted by different kinds of fastest-growing industries like textiles, leather, sugar, etc. The textile industry is one of the most water-consuming sectors in ...

short-paper
Devising a Dust and Noise Pollution Monitoring System for Textile Industry

Textile industry is one of the most labor-intensive manufacturing sectors in developing countries such as Bangladesh, India, Pakistan, etc. During the manufacturing process, the textile machinery produces a high concentration of cotton dust as well as ...

SESSION: Machine Learning Applications
short-paper
Cloud Pattern Classification for Rainfall Prediction using Convolutional Neural Network

Rainfall prediction is an important research topic because of its wide range of applications in disaster and agricultural communities. It depends on several features of earth's atmosphere such as cloud information, speed and direction of wind, ...

short-paper
Determining Confused Brain Activity from EEG Sensor Signals

Human brain, being the most remarkable logic processing unit, sometimes fails to act properly. Often the task at hand becomes too cumbersome for the brain to perceive, which is known as confusion in simple terms. In some certain critical moments, it is ...

SESSION: Invited Papers
invited-talk
AI-powered Network Security: Approaches and Research Directions

Networks are today a critical infrastructure. Their resilience against attacks is thus crucial. Protecting networks requires a comprehensive security life-cycle and the deployment of different protection techniques. To make defenses more effective, ...

invited-talk
MGD: A Utility Metric for Private Data Publication

Differential privacy has been accepted as one of the most popular techniques to protect user data privacy. A common way for utilizing private data under DP is to take an input dataset and synthesize a new dataset that preserves features of the input ...

invited-talk
Improving Safety in Cyber Enabled Underground Mines

Numerous underground mine accidents in the past worldwide highlight the importance and urgent need for safer, more effective, and more reliable mine safety procedures and regulations. Ensuring the safety of miners in underground mine environments is ...

invited-talk
From Schedules to Programs — Reimagining Networking Infrastructure for Future Cyber-Physical Systems

Future cyber-physical systems will require higher capacity, meet more stringent real-time requirements, and adapt quickly to a broader range of network dynamics. However, the traditional approach of using fixed schedules to drive the operation of ...

Index Terms

  1. Proceedings of the 8th International Conference on Networking, Systems and Security
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          Overall Acceptance Rate 12 of 44 submissions, 27%
          YearSubmittedAcceptedRate
          NSysS '19441227%
          Overall441227%