1 Project Implementation Reasonable sophistication Up to 3 people maximum Survey/Analysis type paper Comparative/tradeoff studies Current trends, challenges,

Slides:



Advertisements
Similar presentations
A Project-Oriented Scripting Approach to Introductory Computer Science Ken Abernethy and Kevin Treu Furman University, Greenville, SC, USA Robert Shive.
Advertisements

Secure Systems Research Group - FAU Process Standards (and Process Improvement)
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Presenting Your Web Site. Goals for your presentation Show how your web sites meets your goals for the web site. Showcase your fabulous efforts Highlight.
Presenting Your Web Site. Goals for your presentation Show how your web sites meets your goals for the web site. Showcase your fabulous efforts Highlight.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Website Content, Forms and Dynamic Web Pages. Electronic Portfolios Portfolio: – A collection of work that clearly illustrates effort, progress, knowledge,
Gender-Responsive Programming for Girls – Track II Identify system and program requirements for sustaining effective gender-responsive programming Develop.
Fall CIS 764 Database Systems Design L18.1 Miscellaneous Notes.
MAHI Research Database Data Validation System Software Prototype Demonstration September 18, 2001
Welcome 05G11389 Management Information Systems Jonathan D. Wareham
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
IS Doctoral Seminar in Systems and Technology Information Assurance James Joshi August 31, 2011.
Computer Science and Engineering - University of Notre Dame Jimmy Neutron CSE 40827/60827 – Ubiquitous Computing November 13, 2009 Project Presentation.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Proposal for Term Project Operating Systems, Fall 2015 J. H. Wang Sep. 18, 2015.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
TIPEIL LLP-LDV/TOI/07/IT/019 First Transnational Workshop Athens, 7-8 February 2008 Venue: IEKEP - 34A Averof str. in Nea Ionia 1 st floor DISSEMINATION/VALORISATION.
CSE 534: Advanced Computer Networks
1Thu D. NguyenCS 545: Distributed Systems CS 545: Distributed Systems Spring 2006 Department of Computer Science Rutgers University Thu D. Nguyen.
Welcome to the Minnesota SharePoint User Group. Quick Intro Keynote Presentation – Chris Caposella User Group Kick Off Introductions Goals / Objectives.
ICS (072)Database Systems: An Introduction & Review 1 ICS 424 Advanced Database Systems Dr. Muhammad Shafique.
United States Department of Justice Global Security Working Group Update Global Advisory Committee November 2, 2006 Washington, D.C.
5 PR Praktikum aus Informatik Gabriele Kotsis Summer Term 2009.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.
1 CS240: Network Routing Michalis Faloutsos. 2 Scope Routing Basics BGP routing Ad hoc routing Security Issues Group communications: Broadcast, Multicast.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
April 11, 2001 CMPE CMPE-401 Graduation Project Why is it a compulsory course? Students should learn how to conduct independent research on a new.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Why You Should All Become Computer Engineers ECE 200 (Fall 2015) Saurabh Bagchi School of Electrical and Computer Engineering Purdue University.
Welcome to CPS 210 Graduate Level Operating Systems –readings, discussions, and programming projects Systems Quals course –midterm and final exams Gateway.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
CS 541 Lecture Slides Sunil Prabhakar CS541 Database Systems.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
MWIF Architecture Status Jan Paul Reynolds TC Chair.
PLANNING. Components of an Action Plan  Clearly defines the work to be done  Determines how long it will take to complete the work  Determines what.
Now what? 1.  I have short-listed projects I am interested in  I know the types of projects I would like to pursue  I have an idea of the resources.
Cluster and Grid Computing Course Project. Project Proposal Submit a one-page proposal to me by Tuesday, October 12 Two-person teams are encouraged No.
Welcome 06M11389 Management Information Systems Jonathan D. Wareham
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.

IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Models of Models: Digital Forensics and Domain-Specific Languages
COMPSCI 110 Operating Systems
SuperComputing 2003 “The Great Academia / Industry Grid Debate” ?
Introduction to Information Security
Proposal for Term Project
Principal Evaluation Update
Data and Applications Security Developments and Directions
CPSC 441: Computer Communications
What is IR? In the 70’s and 80’s, much of the research focused on document retrieval In 90’s TREC reinforced the view that IR = document retrieval Document.
Project Implementation Survey type paper New idea/research ??
Proposal for Term Project Operating Systems, Fall 2018
Protocols.
Protocols.
Presentation transcript:

1 Project Implementation Reasonable sophistication Up to 3 people maximum Survey/Analysis type paper Comparative/tradeoff studies Current trends, challenges, possible approaches Typically one person! Number of references should be adequate (depends on area) No introductory stuff! Case studies New idea/research ??

2 Project Topics (not limited to these only!) XML security Implementation of Access Control and Authentication Cryptographic protocols Operating Systems or Database security Ad hoc network security Phising, Spyware, Privacy Issues Web service security Intrusion detection system Auditing Systems Security and ethics/Usability/Economics Smartcards and standards for smartcards E-commerce security (secure transaction) Multimedia security Security in wireless/mobile environments IPv6/ Mobile IPv6 Case studies from a specific domain... Project Opportunities with CSSD

3 Project Schedule Proposal (Due Nov 8; Up to 2 pages) identify group members Structure Introduce problem and motivation for the work State the goals – list tasks/issues and also tentative task distribution among the members What will be the results and its significance References Interim report (Due Nov 26 – right after Thanksgiving) Upto 4 pages Indicate Any changes required to be done from the initial proposal Focus area Task distribution Progress so far

4 Project Schedule Final project report By the last day of the semester Implementation projects should arrange for demonstration with me Reporting requirement Article/Conference format Samples will be provided CD or zipped file needed for implementation project. On a separate page – write the contribution of each member