term project description

Download Report

Transcript term project description

Term Project Description
CAP6135
Spring 2016
Term Project
• Two students form a group to do term project
together
– A research oriented term project
– Project report follows the same format as a published
paper
• At least 6 pages (double column, single spaced, 11 point font)
– Learn how to conduct research and write paper
– Learn how to communicate and collaborate with your
colleague
– Try to find partner using the webCourse discussion forum
• You can do it alone if you want to
2
Timeline for Term Project
• Try to find your partner NOW and discuss
what topic to work on
– Check top security conferences webpage, look
for “advanced program” or “technical program”
– Find the session titles--- they are research topics
in computer security
– Select a topic you are interested and
comfortable and familiar
• Example annual conferences: IEEE S&P, ACM CCS, Usenix Security
Symposium, Eurocrypt, NDSS
• List of good security conferences:
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
7-3
Timeline for Term Project
• Term project proposal:
– First week in March
• Second week in March is Spring Break (Mar. 9-14)
– Submit a 5 minutes’ presentation slides
• Slides should have format of either ppt or PDF
• Face-to-face students: present in class
• Online students: submit presentation slides with
speaking notes on each page
– All slides will be published in webCourse
• You can see what other students are working on
7-4
Timeline for Term Project
• Final submission:
– April 26th midnight for submitting presentation slides (15
minutes) and project paper (6+ pages) via WebCourse
• Face-to-face students: Present term project in the
final exam time (no more than 15 minutes)
• Online students: submit slides with speaking notes
on each page
7-5
Example of Term Project
• Simple:
– Tutorial focused: Survey of the state-of-art research work in a
specific topic
• You can find many survey papers as your examples on IEEE or ACM
journals
– You can find these journals on IEEE Explorer or ACM Digital Library, which can be
accessed through UCF library website
– http://guides.ucf.edu/computersciencedatabases
– You can also access them through webcourse “UCF Library Tools” tab
• You need to survey at least 6 to 8 papers that work on the same topics
– This is not a single paper review assignment!
6
Example of Term Project
• Middle:
– Programming focused: Repeat and realize
algorithm/experiments in a published paper chosen by you
• You will need to program and compare your results with the
paper’s
• To see whether your results match with the paper’s result? Why
they differ to some extend?
– Minor improvement of ideas/algorithms in published
papers
• You will need to prove that your improvement works
– Mathematical proof
– Simulation proof
• Simply using words to justify your idea is not enough!
– Present a novel idea that is significant, but with no
substantial proof (work-in-progress, not complete)
Example of Term Project
• Advanced:
– Present a novel and significant idea with support
from simulation or real experiments
• E.g., success in using an idea from another area to a
new topic in computer security
• Simulations/experiments prove the effectiveness of the
proposed approach
– Has potential to be further developed as an
academic publishable paper
• Then you have the chance to really publish a paper
from this term project work!
Network Security
7-8
Find Good Research Paper
• Find papers in high-quality conferences
– There are too many conferences/workshops!!
– Security research conferences:
• Top ranking conferences:
– IEEE Security & Privacy, ACM CCS, Usenix Security
• Other good conferences:
– NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS….
– Just google “NDSS 2011”, etc.
• Conference papers are grouped into sections according to topics
– The section title will tell you the research topic
– Help you quickly find papers you are interested
9
Find Good Research Paper
• Good security research journals:
– ACM Transactions on Information and System Security
– IEEE Transactions on Dependable and Secure Computing
– IEEE Transactions on Information Forensics and Security
• Problem for journals:
– They are slow in publishing, usually will be two years later than
conference papers
• Good resource to find security conferences:
– http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
10
Multi-Step Layered Approach to
Read Papers for Research
•
•
•
•
Stage 1: find conference, session titles
Stage 2: read paper titles
Stage 3: read abstract of papers
Stage 4: read “Introduction” (and “related
work”)
• Stage 5: read all
• In each step you filter and keep 10%~20% of
papers from the previous step