Term Project Description CAP6135 Spring 2012. 2 Term Project Two students form a group to do term project together – A research oriented term project.

Slides:



Advertisements
Similar presentations
CSC668 Topics in Computing Project Information and Suggestions.
Advertisements

Fernbank 5th Grade IB Exhibition Project
Introduction 1-1 CS6204 Recent Advances in Computer Security and Privacy 3-credit graduate-level seminar Danfeng (Daphne) Yao Spring 2010 Office hours:
Advanced Data Communications (Network Security) TaeKyoung Kwon
Guidelines for Term Paper Cultural Geography Spring 2011.
Advanced Topics in Next- Generation Wireless Networks Qian Zhang Department of Computer Science HKUST.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
How to Read a Technical Paper Locking and Consistency 10/7/05.
EDCI650 Curriculum Design Lecture 1 – Overview Our Electronic Classroom Two primary ways of getting around the classroom –Grand Central Station –Course.
BBI 2420 ORAL INTERACTION SKILLS 1 ST FACE TO FACE SESSION 15 FEBRUARY 2015 SEM 2, 2014/2015.
Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.
1 EEL 6935: Embedded Systems Seminar. 2 General Information Instructor: Ann Gordon-Ross Office: Benton Office Hours – By appointment.
1 How to Search, Read, Write, and Present a Paper.
1 EEL 6935: Embedded Systems Seminar. 2 General Information Instructor: Ann Gordon-Ross Office: Benton Office Hours – By appointment.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2015.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
Proposal for Term Project Operating Systems, Fall 2011 J. H. Wang Nov. 3, 2011.
Proposal for Term Project Operating Systems, Fall 2015 J. H. Wang Sep. 18, 2015.
Lab Orientation EDUC W200 Fall Goals Introductions for instructor and students Familiarize students with the course syllabus Familiarize students.
Webcast for IEPEC Conference Moderators Cara Lee Mahany Braithwait February 2012.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Research Paper Assignment CS 435 Winter, As an important part of the course requirement, each student will participate in a group project to prepare.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
Dana Nau: CMSC 722, AI Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
Digital Image Processing: Bernd Girod, © Stanford University -- Project Proposals 1 EE368/CS232 Final Project Develop, implement and test/demonstrate.
T Seminar on Network Security. Overview Paper finalization (deadline ) –Final check, images, references, style –Note the changed date of.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.
1 How to Give a Good Presentation? Cliff C. Zou CAP /07/08.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2013.
How to Read Research Papers? Xiao Qin Department of Computer Science and Software Engineering Auburn University
Proposal for Term Project Operating Systems, Fall 2012 J. H. Wang Nov. 13, 2012.
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
CAP6135: Malware and Software Vulnerability Analysis Paper Presentation and Summary Cliff Zou Spring 2010.
Internet Economics כלכלת האינטרנט Class 12 – Preparing for the second semester. 1.
ESCI 410 – February 26, 2014 Your Pre-Internship and Assessment Warren Wessel Faculty of Education University of Regina 1.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
Term Paper Topics Quantitative Methods for Business Strayer University by Tristan Hübsch Quantitative Methods for Business Strayer University.
1 How to Give a Good Presentation? Cliff C. Zou CAP /2010.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Special topics in computer applications Taekyoung Kwon
CS614: Advanced Course in Computer Systems (Spring’04) Instructor: Ken Birman TA: non assigned (yet)
INFO 4990: Information Technology Research Methods Guide to the Research Literature Lecture by A. Fekete (based in part on materials by J. Davis and others)
CAP6135: Malware and Software Vulnerability Analysis Paper Presentation and Summary Cliff Zou Spring 2013.
Class will start at the top of the hour! Please turn the volume up on your computer speakers to access the audio feature of this seminar. WELCOME TO CE101.
Advances in Cloud Computing CIS6930/CIS4930
CSCE 990 Advanced Distributed Systems Seminar Ying Lu 104 Schorr Center
CAP6135: Malware and Software Vulnerability Analysis Paper Presentation and Summary Cliff Zou Spring 2015.
Course Information Andy Wang COP 5611 Advanced Operating Systems.
Dr. Sundar Christopher Navigating Graduate School and Beyond: Sow Well Now To Reap Big Later Writing Papers.
Dana Nau: CMSC 722, AI Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
Course Information Andy Wang COP 5611 Advanced Operating Systems.
REPORTING YOUR PROJECT OUTCOMES HELEN MCBURNEY. PROGRAM FOR TODAY: Report Reporting to local colleagues Reporting to the Organisation Tips for abstract.
Reporting your Project Outcomes Helen McBurney. Program for today: Report Reporting to local colleagues Reporting to the Organisation Tips for abstract.
BUS 600 Week 6 Final Paper Check this A+ tutorial guideline at ASH/BUS-600-Week-6-Final-Paper The final research.
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
Group Assignment Instructions
100 minute paper assignment
Epidemic spreading in complex networks with degree correlations
CAP6135: Malware and Software Vulnerability Analysis Paper Presentation and Summary Cliff Zou Spring 2012.
CSC 682: Advanced Computer Security
Academic Communication Lesson 3
ECE 3000: Engineering Seminar
How to Give a Good Presentation?
Proposal for Term Project Operating Systems, Fall 2018
General recommendations
Term Project Description
CAP6135: Malware and Software Vulnerability Analysis Paper Presentation and Summary Cliff Zou Spring 2016.
Presentation transcript:

Term Project Description CAP6135 Spring 2012

2 Term Project Two students form a group to do term project together – A research oriented term project – Project report follows the same format as a published paper At least 6 pages (double column, single spaced, 11 point font) – Learn how to conduct research and write paper – Learn how to communicate and collaborate with your colleague – Try to find partner using the webcourse discussion forum You can do it alone if you want to

Timeline for Term Project Try to find your partner NOW and discuss what topic to work on – Check top security conferences webpage, look for “advanced program” or “technical program” – Find the session titles--- they are research topics in computer security – Select a topic you are interested and comfortable and familiar Network Security7-3

Timeline for Term Project Term project proposal: – Last week in February First week in March is Spring Break – Submit a 5 to 7 minutes’ presentation slides Face-to-face: present in class Online: submit presentation slides with speaking notes on each page – All slides will be published in webcourse You can see what other students are working on Network Security7-4

Timeline for Term Project Final submission: – April 24 th midnight for submitting presentation slides (25-30 minutes) and project report via webcourse Face-to-face students: Present term project in the last one lecture time + final exam time Online students: submit slides with speaking notes on each page All submissions will be published in webcourse Network Security7-5

6 Example of Term Project Simple: – Survey of the state-of-art research work in a topic You can find many survey papers as your reference – Repeat and realize algorithm/experiments in a published paper chosen by you You will need to program and compare your results with the paper’s Middle: – Minor improvement of ideas/algorithms in published papers You will need to prove that your improvement works – Either mathematical proof, or simulation proof – Present a novel idea, but with no substantial proof

Example of Term Project Advanced: – Present a novel idea with support from simulation or real experiments E.g., success in using an idea from another area to a new topic in computer security – Has potential to be developed as an academic publishable paper Network Security7-7

8 Find Good Research Paper Find papers in high-quality conferences – There are too many conferences/workshops!! – Security research conferences: Top ranking conferences: – IEEE Security & Privacy, ACM CCS, Usenix Security Other good conferences: – NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS…. – Just google “NDSS 2011”, etc. Conference papers are grouped into sections according to topics – The section title will tell you the research topic – Help you quickly find papers you are interested

Find Good Research Paper Good security research journals: – ACM Transactions on Information and System Security – IEEE Transactions on Dependable and Secure Computing – IEEE Transactions on Information Forensics and Security Problem for journals: – They are slow in publishing, usually will be two years later than conference papers Good resource to find security conferences: – 9