110 likes | 384 Views
Term Project Description. CAP6135 Spring 2015. Term Project. Two students form a group to do term project together A research oriented term project Project report follows the same format as a published paper At least 6 pages (double column, single spaced, 11 point font)
E N D
Term Project Description CAP6135 Spring 2015
Term Project • Two students form a group to do term project together • A research oriented term project • Project report follows the same format as a published paper • At least 6 pages (double column, single spaced, 11 point font) • Learn how to conduct research and write paper • Learn how to communicate and collaborate with your colleague • Try to find partner using the webCourse discussion forum • You can do it alone if you want to
Timeline for Term Project • Try to find your partner NOW and discuss what topic to work on • Check top security conferences webpage, look for “advanced program” or “technical program” • Find the session titles--- they are research topics in computer security • Select a topic you are interested and comfortable and familiar • Example annual conferences: IEEE S&P, ACM CCS, Usenix Security Symposium, Eurocrypt, NDSS • List of good security conferences: http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
Timeline for Term Project • Term project proposal: • First week in March • Second week in March is Spring Break (Mar. 9-14) • Submit a 5 minutes’ presentation slides • Slides should have format of either ppt or PDF • Face-to-face students: present in class • Online students: submit presentation slides with speaking notes on each page • All slides will be published in webCourse • You can see what other students are working on
Timeline for Term Project • Final submission: • April 22nd midnight for submitting presentation slides (15 minutes) and project report (6+ pages) via Canvas • Face-to-face students: Present term project in the last one lecture (04/23) + final exam time • Online students: submit slides with speaking notes on each page • All submissions will be published on webCourse on April 23rd.
Example of Term Project • Simple: • Tutorial focused: Survey of the state-of-art research work in a specific topic • You can find many survey papers as your examples on IEEE or ACM journals • You can find these journals on IEEE Explorer or ACM Digital Library, which can be accessed through UCF library website • You can also access them through webcourse “UCF Library Tools” tab • You need to survey at least 6 to 8 papers that work on the same topics • This is not a single paper review assignment!
Example of Term Project • Middle: • Programming focused: Repeat and realize algorithm/experiments in a published paper chosen by you • You will need to program and compare your results with the paper’s • To see whether your results match with the paper’s result? Why they differ to some extend? • Minor improvement of ideas/algorithms in published papers • You will need to prove that your improvement works • Mathematical proof • Simulation proof • Simply using words to justify your idea is not enough! • Present a novel idea that is significant, but with no substantial proof
Example of Term Project • Advanced: • Present a novel and significant idea with support from simulation or real experiments • E.g., success in using an idea from another area to a new topic in computer security • Simulations/experiments prove the effectiveness of the proposed approach • Has potential to be further developed as an academic publishable paper • Then you have the chance to really publish a paper from this term project work! Network Security
Find Good Research Paper • Find papers in high-quality conferences • There are too many conferences/workshops!! • Security research conferences: • Top ranking conferences: • IEEE Security & Privacy, ACM CCS, Usenix Security • Other good conferences: • NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS…. • Just google “NDSS 2011”, etc. • Conference papers are grouped into sections according to topics • The section title will tell you the research topic • Help you quickly find papers you are interested
Find Good Research Paper • Good security research journals: • ACM Transactions on Information and System Security • IEEE Transactions on Dependable and Secure Computing • IEEE Transactions on Information Forensics and Security • Problem for journals: • They are slow in publishing, usually will be two years later than conference papers • Good resource to find security conferences: • http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
Multi-Step Layered Approach to Read Papers for Research • Stage 1: find conference, session titles • Stage 2: read paper titles • Stage 3: read abstract of papers • Stage 4: read “Introduction” (and “related work”) • Stage 5: read all • In each step you filter and keep 10%~20% of papers from the previous step