skip to main content
10.1145/3428363acmotherconferencesBook PagePublication PagesnsyssConference Proceedingsconference-collections
NSysS '20: Proceedings of the 7th International Conference on Networking, Systems and Security
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
7th NSysS 2020: 7th International Conference on Networking, Systems and Security Dhaka Bangladesh December 22 - 24, 2020
ISBN:
978-1-4503-8905-1
Published:
22 December 2020

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Data Analytics for Healthcare
research-article
Attacks on Health Workers during COVID-19 Pandemic - Data Exploration and News Article Detection using NLP and GRU model

A major less spoken impact of COVID-19 is the irrational behavior from people. We are experiencing abnormal behaviour from individuals all over the world. It ranges from “absurd conspiracy theories” to “panic buying of tissue paper”. Likewise, one such ...

short-paper
Can COVID-19 Change the Big5 Personality Traits of Healthcare Workers?

To curb the spread of the coronavirus, authorities around the world implemented lockdown measures for months. In these locked down days, people as well as healthcare workers (HWs) are increasingly relying on social media platforms to socialize among ...

short-paper
Application of Machine Learning Based Hospital Up-gradation Policy for Bangladesh

Hospital beds are an essential part of delivering medical services to the patients. Due to the hospital bed demand’s stochastic nature, it is hard to predict future needs and devise an appropriate augmentation scheme. In this work, we consider ...

SESSION: Text Analysis
research-article
A Benchmark Study on Machine Learning Methods using Several Feature Extraction Techniques for News Genre Detection from Bangla News Articles & Titles

Genre detection from news articles or news titles is one kind of text classification procedures where news articles or titles are categorized among different families. Nowadays, text classification has become a key research field in text mining and ...

research-article
Confronting the Constraints for Optical Character Segmentation from Printed Bangla Text Image

In a world of digitization, optical character recognition holds the automation to written history. Optical character recognition system basically converts printed images into editable texts for better storage and usability. To be completely functional, ...

SESSION: Networking and Security
research-article
Machine Learning Based Malware Detection on Encrypted Traffic: A Comprehensive Performance Study

The increasing volume of encrypted network traffic yields a clutter for hackers to use encryption to spread their malicious software on the network. We study the problem of detecting TLS-encrypted malware on the client side using metadata and TLS ...

short-paper
Efficient Feature Selection for Detecting Botnets based on Network Traffic and Behavior Analysis

Ensuring integrity and security of computer networks is one of the growing concerns. The number of malware specifically designed to damage, disrupt or perform illegitimate actions on data, networks or hosts are increasing day by day. Detection of hosts ...

SESSION: Applications of Machine Learning on Limited Data
research-article
Solving The Maze of Diagnosing Parkinson’s Disease based on Portable EEG Sensing to be Adaptable to Go In-The-Wild

Parkinson’s disease is a common and highly threatening neurodegenerative disease, which has no confirmed well-adopted diagnosis method to date. All research efforts in this regard focus on diagnosing in controlled environment such as laboratories. ...

research-article
Distributing Active Learning Algorithms

Active Learning is a machine learning strategy that aims at finding out an optimal labeling sequence for a huge pool of unlabeled data. We observe that sometimes there are not enough labeled data in contrast to unlabeled samples. Moreover, in some ...

short-paper
Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder

Network Intrusion Detection System (NIDS) is an important tool for network administrators to detect security breaches in a network. However, due to the diversity of attacks and imbalanced datasets having less number of data pertinent to attack events, ...

SESSION: Scalable Systems and Visualization
research-article
Distributed Principal Component Analysis for Real-time Big Data Processing

Real-time big data analytics, which is the combination of real-time analytics and big data, works on processing large scale data as it arrives and strives to obtain insights from it without exceeding a limited time period. Massive amount of data is ...

research-article
Scaling Up Bit-Flip Quantum Error Correction

Quantum error correction comes from the marriage of quantum mechanics with the theory of error-correcting codes, which is still at the rudimentary stage tackling only 1 qubit to date. As, unlike the classical world, the extent of error in the quantum ...

research-article
An Integrated Inspection and Visualization Tool for Accurate Android Collusive Malware Detection

Collusive malwares in Android exploit the Inter Component Communication (ICC) scheme in Android architecture. Several collusive malware detection and analysis tools have been developed since the beginning of Android. These tools are mostly based on ...

SESSION: Machine Learning for Security
research-article
An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning

The growing trend of attacking Android smart phones using malicious app has started posing significant threats for the users. Many approaches have been introduced for protecting the users against such malware. However, those solutions tend to use many ...

short-paper
A Machine Learning based Approach for Protecting Wireless Networks Against DoS Attacks

Two major security threats for wireless networks are physical jamming and virtual jamming. The inherent openness of the wireless channels exposes the network to the physical jamming problem. On the other hand, the virtual carrier-sensing mechanism of ...

Index Terms

  1. Proceedings of the 7th International Conference on Networking, Systems and Security
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          Overall Acceptance Rate12of44submissions,27%
          YearSubmittedAcceptedRate
          NSysS '19441227%
          Overall441227%