No abstract available.
Proceeding Downloads
Attacks on Health Workers during COVID-19 Pandemic - Data Exploration and News Article Detection using NLP and GRU model
A major less spoken impact of COVID-19 is the irrational behavior from people. We are experiencing abnormal behaviour from individuals all over the world. It ranges from “absurd conspiracy theories” to “panic buying of tissue paper”. Likewise, one such ...
Can COVID-19 Change the Big5 Personality Traits of Healthcare Workers?
- Akif Ahmed,
- Md. Saddam Hossain Mukta,
- Fardin Muntasir,
- Shaguffta Rahman,
- A.K.M. Najmul Islam,
- Mohammed Eunus Ali
To curb the spread of the coronavirus, authorities around the world implemented lockdown measures for months. In these locked down days, people as well as healthcare workers (HWs) are increasingly relying on social media platforms to socialize among ...
Application of Machine Learning Based Hospital Up-gradation Policy for Bangladesh
Hospital beds are an essential part of delivering medical services to the patients. Due to the hospital bed demand’s stochastic nature, it is hard to predict future needs and devise an appropriate augmentation scheme. In this work, we consider ...
A Benchmark Study on Machine Learning Methods using Several Feature Extraction Techniques for News Genre Detection from Bangla News Articles & Titles
Genre detection from news articles or news titles is one kind of text classification procedures where news articles or titles are categorized among different families. Nowadays, text classification has become a key research field in text mining and ...
Confronting the Constraints for Optical Character Segmentation from Printed Bangla Text Image
- Abu Saleh Md. Abir,
- Sanjana Rahman,
- Samia Ellin,
- Maisha Farzana,
- Md. Hridoy Manik,
- Chowdhury Rafeed Rahman
In a world of digitization, optical character recognition holds the automation to written history. Optical character recognition system basically converts printed images into editable texts for better storage and usability. To be completely functional, ...
Machine Learning Based Malware Detection on Encrypted Traffic: A Comprehensive Performance Study
The increasing volume of encrypted network traffic yields a clutter for hackers to use encryption to spread their malicious software on the network. We study the problem of detecting TLS-encrypted malware on the client side using metadata and TLS ...
Efficient Feature Selection for Detecting Botnets based on Network Traffic and Behavior Analysis
Ensuring integrity and security of computer networks is one of the growing concerns. The number of malware specifically designed to damage, disrupt or perform illegitimate actions on data, networks or hosts are increasing day by day. Detection of hosts ...
Solving The Maze of Diagnosing Parkinson’s Disease based on Portable EEG Sensing to be Adaptable to Go In-The-Wild
Parkinson’s disease is a common and highly threatening neurodegenerative disease, which has no confirmed well-adopted diagnosis method to date. All research efforts in this regard focus on diagnosing in controlled environment such as laboratories. ...
Distributing Active Learning Algorithms
Active Learning is a machine learning strategy that aims at finding out an optimal labeling sequence for a huge pool of unlabeled data. We observe that sometimes there are not enough labeled data in contrast to unlabeled samples. Moreover, in some ...
Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder
Network Intrusion Detection System (NIDS) is an important tool for network administrators to detect security breaches in a network. However, due to the diversity of attacks and imbalanced datasets having less number of data pertinent to attack events, ...
Distributed Principal Component Analysis for Real-time Big Data Processing
Real-time big data analytics, which is the combination of real-time analytics and big data, works on processing large scale data as it arrives and strives to obtain insights from it without exceeding a limited time period. Massive amount of data is ...
Scaling Up Bit-Flip Quantum Error Correction
Quantum error correction comes from the marriage of quantum mechanics with the theory of error-correcting codes, which is still at the rudimentary stage tackling only 1 qubit to date. As, unlike the classical world, the extent of error in the quantum ...
An Integrated Inspection and Visualization Tool for Accurate Android Collusive Malware Detection
Collusive malwares in Android exploit the Inter Component Communication (ICC) scheme in Android architecture. Several collusive malware detection and analysis tools have been developed since the beginning of Android. These tools are mostly based on ...
An Optimized Decision Tree based Android Malware Detection Approach using Machine Learning
The growing trend of attacking Android smart phones using malicious app has started posing significant threats for the users. Many approaches have been introduced for protecting the users against such malware. However, those solutions tend to use many ...
A Machine Learning based Approach for Protecting Wireless Networks Against DoS Attacks
Two major security threats for wireless networks are physical jamming and virtual jamming. The inherent openness of the wireless channels exposes the network to the physical jamming problem. On the other hand, the virtual carrier-sensing mechanism of ...
Index Terms
- Proceedings of the 7th International Conference on Networking, Systems and Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
NSysS '19 | 44 | 12 | 27% |
Overall | 44 | 12 | 27% |