1 / 11

Term Project Description

Two students form a group to conduct a research-oriented term project. They learn how to conduct research, write a paper, and collaborate with their colleague. The project report follows the format of a published paper. Students can find a partner using the Canvas discussion forum or work alone.

rausch
Download Presentation

Term Project Description

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Term Project Description CAP6135 Spring 2014

  2. Term Project • Two students form a group to do term project together • A research oriented term project • Project report follows the same format as a published paper • At least 6 pages (double column, single spaced, 11 point font) • Learn how to conduct research and write paper • Learn how to communicate and collaborate with your colleague • Try to find partner using the Canvas discussion forum • You can do it alone if you want to

  3. Timeline for Term Project • Try to find your partner NOW and discuss what topic to work on • Check top security conferences webpage, look for “advanced program” or “technical program” • Find the session titles--- they are research topics in computer security • Select a topic you are interested and comfortable and familiar • Example annual conferences: IEEE S&P, ACM CCS, Usenix Security Symposium, Eurocrypt, NDSS • List of good security conferences: http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm

  4. Timeline for Term Project • Term project proposal: • Last week in February • First week in March is Spring Break (Mar. 3-8) • Submit a 5 to 7 minutes’ presentation slides • Slides should have format of either ppt or PDF • Face-to-face students: present in class • Online: submit presentation slides with speaking notes on each page • All slides will be published in Canvas • You can see what other students are working on

  5. Timeline for Term Project • Final submission: • April 20th midnight for submitting presentation slides (25-30 minutes) and project report (6+ pages) via Canvas • Face-to-face students: Present term project in the last one lecture (04/21) + final exam time • Online students: submit slides with speaking notes on each page • All submissions will be published in Canvas on April 22nd. Network Security

  6. Example of Term Project • Simple: • Tutorial focused: Survey of the state-of-art research work in a specific topic • You can find many survey papers as your examples on IEEE or ACM journals • You can find these journals on IEEE Explorer or ACM Digital Library, which can be accessed through UCF library website • You can also access them through webcourse “UCF Library Tools” tab • You need to survey at least 6 to 8 papers that work on the same topics • This is not a single paper review assignment! • Programming focused: Repeat and realize algorithm/experiments in a published paper chosen by you • You will need to program and compare your results with the paper’s • To see whether your results match with the paper’s result? Why they differ to some extend?

  7. Example of Term Project • Middle: • Minor improvement of ideas/algorithms in published papers • You will need to prove that your improvement works • Mathematical proof • Simulation proof • Simply using words to justify your idea is not enough! • Present a novel idea that is significant, but with no substantial proof

  8. Example of Term Project • Advanced: • Present a novel and significant idea with support from simulation or real experiments • E.g., success in using an idea from another area to a new topic in computer security • Simulations/experiments prove the effectiveness of the proposed approach • Has potential to be further developed as an academic publishable paper • Then you have the chance to really publish a paper from this term project work! Network Security

  9. Find Good Research Paper • Find papers in high-quality conferences • There are too many conferences/workshops!! • Security research conferences: • Top ranking conferences: • IEEE Security & Privacy, ACM CCS, Usenix Security • Other good conferences: • NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS…. • Just google “NDSS 2011”, etc. • Conference papers are grouped into sections according to topics • The section title will tell you the research topic • Help you quickly find papers you are interested

  10. Find Good Research Paper • Good security research journals: • ACM Transactions on Information and System Security • IEEE Transactions on Dependable and Secure Computing • IEEE Transactions on Information Forensics and Security • Problem for journals: • They are slow in publishing, usually will be two years later than conference papers • Good resource to find security conferences: • http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm

  11. Multi-Step Layered Approach to Read Papers for Research • Stage 1: find conference, session titles • Stage 2: read paper titles • Stage 3: read abstract of papers • Stage 4: read “Introduction” (and “related work”) • Stage 5: read all

More Related