Term Project Description CAP6135 Spring 2015 Term Project • Two students form a group to do term project together – A research oriented term project – Project report follows the same format as a published paper • At least 6 pages (double column, single spaced, 11 point font) – Learn how to conduct research and write paper – Learn how to communicate and collaborate with your colleague – Try to find partner using the webCourse discussion forum • You can do it alone if you want to 2 Timeline for Term Project • Try to find your partner NOW and discuss what topic to work on – Check top security conferences webpage, look for “advanced program” or “technical program” – Find the session titles--- they are research topics in computer security – Select a topic you are interested and comfortable and familiar – Example annual conferences: IEEE S&P, ACM CCS, Usenix Security Symposium, Eurocrypt, NDSS – List of good security conferences: http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm 7-3 Timeline for Term Project • Term project proposal: – First week in March • Second week in March is Spring Break (Mar. 9-14) – Submit a 5 minutes’ presentation slides • Slides should have format of either ppt or PDF • Face-to-face students: present in class • Online students: submit presentation slides with speaking notes on each page – All slides will be published in webCourse • You can see what other students are working on 7-4 Timeline for Term Project • Final submission: – April 22nd midnight for submitting presentation slides (15 minutes) and project report (6+ pages) via Canvas • Face-to-face students: Present term project in the last one lecture (04/23) + final exam time • Online students: submit slides with speaking notes on each page • All submissions will be published on webCourse on April 23rd. 7-5 Example of Term Project • Simple: – Tutorial focused: Survey of the state-of-art research work in a specific topic • You can find many survey papers as your examples on IEEE or ACM journals – You can find these journals on IEEE Explorer or ACM Digital Library, which can be accessed through UCF library website – You can also access them through webcourse “UCF Library Tools” tab • You need to survey at least 6 to 8 papers that work on the same topics – This is not a single paper review assignment! 6 Example of Term Project • Middle: – Programming focused: Repeat and realize algorithm/experiments in a published paper chosen by you • You will need to program and compare your results with the paper’s • To see whether your results match with the paper’s result? Why they differ to some extend? – Minor improvement of ideas/algorithms in published papers • You will need to prove that your improvement works – Mathematical proof – Simulation proof • Simply using words to justify your idea is not enough! – Present a novel idea that is significant, but with no substantial proof Example of Term Project • Advanced: – Present a novel and significant idea with support from simulation or real experiments • E.g., success in using an idea from another area to a new topic in computer security • Simulations/experiments prove the effectiveness of the proposed approach – Has potential to be further developed as an academic publishable paper • Then you have the chance to really publish a paper from this term project work! Network Security 7-8 Find Good Research Paper • Find papers in high-quality conferences – There are too many conferences/workshops!! – Security research conferences: • Top ranking conferences: – IEEE Security & Privacy, ACM CCS, Usenix Security • Other good conferences: – NDSS, RAID, ACSAC, SecureCom, AsiaCCS, DSN, ESORICS…. – Just google “NDSS 2011”, etc. • Conference papers are grouped into sections according to topics – The section title will tell you the research topic – Help you quickly find papers you are interested 9 Find Good Research Paper • Good security research journals: – ACM Transactions on Information and System Security – IEEE Transactions on Dependable and Secure Computing – IEEE Transactions on Information Forensics and Security • Problem for journals: – They are slow in publishing, usually will be two years later than conference papers • Good resource to find security conferences: – http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm 10 Multi-Step Layered Approach to Read Papers for Research • • • • Stage 1: find conference, session titles Stage 2: read paper titles Stage 3: read abstract of papers Stage 4: read “Introduction” (and “related work”) • Stage 5: read all • In each step you filter and keep 10%~20% of papers from the previous step