term project description
Download
Report
Transcript term project description
Term Project Description
CAP6135
Spring 2013
Term Project
• Two students form a group to do term project
together
– A research oriented term project
– Project report follows the same format as a published
paper
• At least 6 pages (double column, single spaced, 11 point font)
– Learn how to conduct research and write paper
– Learn how to communicate and collaborate with your
colleague
– Try to find partner using the Canvas discussion forum
• You can do it alone if you want to
2
Timeline for Term Project
• Try to find your partner NOW and discuss
what topic to work on
– Check top security conferences webpage, look
for “advanced program” or “technical program”
– Find the session titles--- they are research topics
in computer security
– Select a topic you are interested and
comfortable and familiar
– Example conferences: IEEE S&P, ACM CCS, Usenix Security
Symposium
– List of good security conferences:
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
7-3
Timeline for Term Project
• Term project proposal:
– Last week in February
• First week in March is Spring Break (Mar. 4-9)
– Submit a 5 to 7 minutes’ presentation slides
• Face-to-face students: present in class
• Online: submit presentation slides with speaking notes
on each page
– All slides will be published in Canvas
• You can see what other students are working on
7-4
Timeline for Term Project
• Final submission:
– April 21st midnight for submitting presentation
slides (25-30 minutes) and project report (6+
pages) via Canvas
• Face-to-face students: Present term project in
the last one lecture (04/22) + final exam time
• Online students: submit slides with speaking
notes on each page
• All submissions will be published in Canvas on
April 22nd.
Network Security
7-5
Example of Term Project
• Simple:
– Survey of the state-of-art research work in a topic
• You can find many survey papers as your examples on IEEE or ACM
journals
– Repeat and realize algorithm/experiments in a published
paper chosen by you
• You will need to program and compare your results with the paper’s
• Middle:
– Minor improvement of ideas/algorithms in published papers
• You will need to prove that your improvement works
– Either mathematical proof, or simulation proof
– Present a novel idea, but with no substantial proof
6
Example of Term Project
• Advanced:
– Present a novel idea with support from simulation
or real experiments
• E.g., success in using an idea from another area to a
new topic in computer security
– Has potential to be further developed as an
academic publishable paper
Network Security
7-7
Find Good Research Paper
• Find papers in high-quality conferences
– There are too many conferences/workshops!!
– Security research conferences:
• Top ranking conferences:
– IEEE Security & Privacy, ACM CCS, Usenix Security
• Other good conferences:
– NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS….
– Just google “NDSS 2011”, etc.
• Conference papers are grouped into sections according to topics
– The section title will tell you the research topic
– Help you quickly find papers you are interested
8
Find Good Research Paper
• Good security research journals:
– ACM Transactions on Information and System Security
– IEEE Transactions on Dependable and Secure Computing
– IEEE Transactions on Information Forensics and Security
• Problem for journals:
– They are slow in publishing, usually will be two years later than
conference papers
• Good resource to find security conferences:
– http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
9
•
•
•
•
Stage 1: find conference, session titles
Stage 2: read paper titles
Stage 3: read abstract of papers
Stage 4: read “Introduction” (and “related
work”)
• Stage 5: read all