70 likes | 80 Views
This term project focuses on conducting research in the field of network security and writing a project report following the format of a published paper. Students will learn how to communicate and collaborate effectively with their colleague while exploring various research topics in computer security.
E N D
Term Project Description CAP6135 Spring 2010
Term Project • Two students form a group to do term project together • A research oriented term project • Project report follows the same format as a published paper • At least 6 pages (double column, 11 point font) • Learn how to conduct research and write paper • Learn how to communicate and collaborate with your colleague
Timeline for Term Project • Try to find your partner NOW and discuss what topic to work on • Check top security conferences webpage, look for “advanced program” or “technical program” • Find the session titles--- they are research topics in computer security • Select a topic you are interested and comfortable and familiar Network Security
Timeline for Term Project • Term project proposal: • First week in March • Second week is Spring Break • Submit a 5 to 7 minutes’ presentation slides • Face-to-face: present in class • Online: submit presentation slides with speaking notes on each page Network Security
Timeline for Term Project • Final submission: • April 23rd for submitting presentation slides and project report Network Security
Example of Term Project • Simple: • Survey of the state-of-art research work in a topic • You can find many survey papers as your reference • Repeat and realize algorithm/experiments in a published paper chosen by you • You will need to program and compare your results with the paper’s • Middle: • Minor improvement of algorithms in published papers • You will need to prove that your improvement works • Either mathematical proof, or simulation proof • Present a novel idea, but with no substantial proof
Example of Term Project • Advanced: • Present a novel idea with support from simulation or real experiments • E.g., success in using an idea from another area to a new topic in computer security • Has potential to be developed as a publishable paper Network Security