Term project description

Download Report

Transcript Term project description

Term Project Description
CAP6135
Spring 2012
Term Project
• Two students form a group to do term project
together
– A research oriented term project
– Project report follows the same format as a published
paper
• At least 6 pages (double column, single spaced, 11 point font)
– Learn how to conduct research and write paper
– Learn how to communicate and collaborate with your
colleague
– Try to find partner using the webcourse discussion forum
• You can do it alone if you want to
2
Timeline for Term Project
• Try to find your partner NOW and discuss
what topic to work on
– Check top security conferences webpage, look
for “advanced program” or “technical program”
– Find the session titles--- they are research topics
in computer security
– Select a topic you are interested and
comfortable and familiar
Network Security
7-3
Timeline for Term Project
• Term project proposal:
– Last week in February
• First week in March is Spring Break
– Submit a 5 to 7 minutes’ presentation slides
• Face-to-face: present in class
• Online: submit presentation slides with speaking notes
on each page
– All slides will be published in webcourse
• You can see what other students are working on
Network Security
7-4
Timeline for Term Project
• Final submission:
– April 24th midnight for submitting presentation
slides (25-30 minutes) and project report via
webcourse
• Face-to-face students: Present term project in
the last one lecture time + final exam time
• Online students: submit slides with speaking
notes on each page
• All submissions will be published in webcourse
Network Security
7-5
Example of Term Project
• Simple:
– Survey of the state-of-art research work in a topic
• You can find many survey papers as your reference
– Repeat and realize algorithm/experiments in a published
paper chosen by you
• You will need to program and compare your results with the paper’s
• Middle:
– Minor improvement of ideas/algorithms in published papers
• You will need to prove that your improvement works
– Either mathematical proof, or simulation proof
– Present a novel idea, but with no substantial proof
6
Example of Term Project
• Advanced:
– Present a novel idea with support from simulation
or real experiments
• E.g., success in using an idea from another area to a
new topic in computer security
– Has potential to be developed as an academic
publishable paper
Network Security
7-7
Find Good Research Paper
• Find papers in high-quality conferences
– There are too many conferences/workshops!!
– Security research conferences:
• Top ranking conferences:
– IEEE Security & Privacy, ACM CCS, Usenix Security
• Other good conferences:
– NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS….
– Just google “NDSS 2011”, etc.
• Conference papers are grouped into sections according to topics
– The section title will tell you the research topic
– Help you quickly find papers you are interested
8
Find Good Research Paper
• Good security research journals:
– ACM Transactions on Information and System Security
– IEEE Transactions on Dependable and Secure Computing
– IEEE Transactions on Information Forensics and Security
• Problem for journals:
– They are slow in publishing, usually will be two years later than
conference papers
• Good resource to find security conferences:
– http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
9