


default search action
NSysS 2018: Dhaka, Bangladesh
- 5th International Conference on Networking, Systems and Security, NSysS 2018, Dhaka, Bangladesh, December 18-20, 2018. IEEE 2018, ISBN 978-1-7281-1324-1

- Gazi Zahirul Islam

, Mohammod Abul Kashem:
An OFDMA-based New MAC Mechanism for IEEE 802.11ax. 3-9 - Masud Rana, M. Kaykobad, A. B. M. Alim Al Islam:

A New Approach for Selecting Aggregated Multicast Trees to Reduce Forwarding States. 10-18 - Tasmiah Tamzid Anannya

, Ashikur Rahman
:
Extended Neighborhood Knowledge based Dominant Pruning (ExDP). 19-27 - Laboni Sarker

, Sakshar Chakravarty
, Ashikur Rahman
:
A Graph Theoretic Approach for Maximizing Target Coverage using Minimum Directional Sensors in Randomly Deployed Wireless Sensor Networks. 28-36 - Sirat Samyoun, Ashikur Rahman

, Raqeebir Rab:
Design and Analysis of a Fault-Tolerant Topology Control Algorithm for Wireless Multi-hop Networks. 37-45 - A. S. M. Rizvi, Tarik Reza Toha

, Siddhartha Shankar Das
, Sriram Chellappan, A. B. M. Alim Al Islam:
Exploiting a Synergy between Greedy Approach and NSGA for Scheduling in Computing Clusters. 46-53 - Nafis Sadeq, Fazle Rabbi Rahat, Ashikur Rahman

, Sheikh Iqbal Ahamed, Md. Kamrul Hasan:
Smartphone-based Calorie Estimation From Food Image Using Distance Information. 66-73 - Nur Imtiazul Haque, Kazi Md. Rokibul Alam, Tasfia Mashiat, Yasuhiko Morimoto:

A Technique to Enrich the Secrecy Level of High Capacity Data Hiding Steganography Technique in JPEG Compressed Image. 77-83 - Shanto Roy

, Md. Ashaduzzaman, Mehedi Hassan
, Arnab Rahman Chowdhury:
BlockChain for IoT Security and Management: Current Prospects, Challenges and Future Directions. 84-92 - Mazharul Islam, Md. Nazmuddoha Ansary

, Novia Nurain, Salauddin Parvez Shams, A. B. M. Alim Al Islam:
A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm. 93-101 - Md. Taksir Hasan Majumder, A. B. M. Alim Al Islam:

A Tale of a Deep Learning Approach to Image Forgery Detection. 102-110 - Samiul Ali Sarker, Masudur Rahman, Nasif Muslim, Salekul Islam

:
Performance Analysis of Video Streaming at the Edge and Core Cloud. 113-119 - Md. Saidul Hoque Anik, Md. Adnanul Islam

, A. B. M. Alim Al Islam:
An Approach Towards Multilingual Translation By Semantic-Based Verb Identification And Root Word Analysis. 120-128 - Zaheen Mustakin, Saad Manzur, Tanzila Choudhury, Farzana Rahman, Sriram Chellappan, A. B. M. Alim Al Islam:

Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms. 129-137 - Torikul Islam, Jannatul Ferdush

, M. M. A. Hashem
:
Secured Cloud Computing Outsourcing: A Case Study of Constrained Linear Least Square Problem. 141-145 - Abdur Rahman, Shanto Roy

, M. Shamim Kaiser, Md. Shahidul Islam:
A Lightweight Multi-tier S-MQTT Framework to Secure Communication between low-end IoT Nodes. 146-151 - Mayisha Alam, Novia Nurain, Suraiya Tairin

, Mahmuda Naznin
, A. B. M. Alim Al Islam:
Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs). 152-157 - Md. Saeef Abdul Hadi, Abhijit Saha

, Faysal Ahmad, Mohammad Shahriyar Hasan, Mehebub Hasan Milon:
A Smart Accident Detection and Control System in Vehicular Networks. 158-163

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














