CSCE 813 – Internet
Security
Spring 2014
Project Information
1. Evaluate your professional and personal strength and
weaknesses
·
List your strengths
that influence your professional performance in the field of computing. These may include skills, knowledge, personal
traits, such as diligence, focus on details, etc.
·
Provide one or
more objective justification for each strength you’ve identified,
such as completed project and client satisfaction, awards, etc.
·
List your weaknesses
(both personal and professional) that may influence your performance. For
example, limited coding experience outside of class projects, tend to wait for
the last minute to work on the assignments, etc.
·
Provide one or
more strategies that you plan to apply to limit the effect of the
weaknesses on your performance, e.g., set up a schedule to start project on
time, seek the collaboration of an experienced developer, etc.
Be as thorough as possible! Your gain is to understand your current
capabilities and limitations!
Ask a friend who knows you well to
compose the same lists and their justifications. Do not give
suggestions!
·
Compare your and your friend’s evaluation.
·
Clarify your conflicts and similarities
·
Rank your strengths and weaknesses
Use
your own lists and your friend’s lists to write an “honest” resume that
includes your selected strengths and weaknesses and their corresponding
justifications and mitigation strategies.
·
Have the standard
resume format and information (Name, address, contact info, education, work
experiences, activities, awards, etc.)
·
Include a
detailed Strengths and Weaknesses section discussing the highest ranked
characteristics
Submit your resume only.
Due Date: January 30, 2014
2. Project proposal: 2 pages, double spaced, 12 pt.
i.
Main area of the
proposed project
ii.
Goal of the
project and importance of the goal
iii.
Initial list of
relevant materials
iv.
Group members and
their strength with respect to the project
The aim of the research paper is that you gain understanding of
a specific topic in Internet Security and identify future directions of the
field. Try to answer questions like “Are
the current technologies sufficient to provide security for Internet Applications?”,
“What are the upcoming research and development areas? Do they create new security threats?”, “Can
we provide security assurance for Internet applications?”,
etc.
Focus your research of interest. Pick a specific topic within your area of interest,
e.g., SOAP messages integrity.
Submit your proposal
Due Date: February13, 2014
3. Perform detailed research of the chosen topic and
propose a project: 8-10 pages, double
spaced, 12 pt
Gather additional publications on the chosen topic. In general, you’ll read around 10-20 papers,
depending on the depth and coverage of the materials. The aim is to gain a clear understanding of
the current state of research on the chosen topic and related issues.
Propose a project to develop technology to overcome some
of the limitations identified reading the related work. You should include sufficient technical
details to convince the reader that your approach is feasible. This generally requires that you perform some
initial work related to the project.
Include discussion on how your approach complements existing
technologies and improves upon them.
Submit Proposal DRAFT
NEW!
Due date: March 13, 2014 March 18, 2014
4. Final report
Create a final proposal (20-30 pages, double spaced, 12
points) that contains your completed proposal and bios of the group members.
Submit Proposal
with all sections fully included
Due date: April 10, 2014 April 14,
2014 NOON
5. Student Presentation
Each student will present
the related work section to the class.
Presentation time will be
established later.
Percentage of final project grade per
components
1 : 10%
2. : 15%
3. : 25%
4. : 40%
5. : 10%
Final report Format
Abstract (1 page, single spaced, 11
points)
Introduction
<Brief
overview of
a. Problem description, its importance
b. Representative example
c. Brief description of related works
d. What is missing?
e. Your work addressing the research gap (BS students do not need to
add this portion)
>
Related Works and their Limitations
<Make sure include all relevant works
and be factual about the limitations.
e.g., “XY proposed a methods that is limited.” Is not enough. Give
specifics
on what these limitations are.>
Description of project
<Several chapters on
the proposed project, initial results, expectations, etc.
You need to convince the reader that the work is important, needed and
that
you’re capable of performing the proposed work. >
Conclusion
References