Each student is expected to complete a research paper/project on a relevant comp

Photo of author

By admin

Each student is expected to complete a research paper/project on a relevant computer security topic of the student’s choosing and interest. The intention is to encourage you to explore the frontier of the research community or implement a concrete term project that shows your understanding in cybersecurity.
Option 1: Research Paper
This project can be a review that covers current solutions on a specific technical topic, or a paper that proposes your own solutions on a security-related technical research problem.
Here are possible areas for your project. Your choice of the topic is usually more specific than any of these topics. Note that you can choose a relevant topic that is not covered in our textbook.
• Authentication
• Access control and authorization
• Discretionary and mandatory security policies
• Secure operating systems
• Secure databases
• Risk management
• Security controls and planning
Some reference journals and conference proceedings are listed as follows. For a research paper you are encouraged to use references from these prestigious publications.
Journals
Journal of Computer Security
IEEE Transactions on Secure and Dependable Computing ACM Transactions on Information and System Security Computers & Security
Internet Security Journal
Page 1 of 4
Conferences
ACM Conference on Comp and Communications Security (CCS) IEEE Symposium on Security and Privacy (S&P)
Usenix Security Symposium
European Symposium on Research in Computer Security
IEEE Computer Security Foundations Workshop (CSFW) Workshop on Security and Privacy in E-commerce
IFIP Workshop on Database Security
You are required to explore useful reference papers using NSU’s electronic library. IEEE, ACM, and Springer databases are good resources that can be accessed in the e-library.
For more information please visit http://sherman.library.nova.edu/e- library/index.php?action=subject&col=n&cat=cis (Click
“ACM Digital Library”, “IEEE/IET Digital Library”, or “SpringerLink” -> enter your credentials, then you can search by key words/author/titles/names of journals or conferences. You will have full access to copyrighted articles through these useful resources.)
In addition, I encourage you to explore Google Scholar to find quality publications in the field. Google Scholar is a freely accessible web search engine that indexes the full text or metadata of scholarly literature across an array of publishing formats and disciplines. As a result, you can find the correct APA format of all references that are indexed via Google Scholar.
https://scholar.google.com/
Option 2: Programming Project
Students who want to do a programming project on a relevant system security topic instead of a paper should submit a written project proposal to me. If your programming project proposal is not approved, plan to submit a paper proposal and prepare to write a paper. The format and length requirements for the project proposal are the same as those for the paper option, except that the references may not have to include top publications indicated previously.
Here are some cybersecurity projects for your reference. Note that some of these projects are big and may be supported by a group of developers in the community. You may choose to limit the scope of your proposal and implement only a part of a big project.
https://github.com/topics/cybersecurity
Page 2 of 4
https://sourceforge.net/directory/security/windows/?os=linux&os=android
https://sectools.org/
Additional Requirements
Your proposal should be a formal document that consists of a typed one-to-two-page summary of your proposed topic. Although your proposal does not need to present any conclusions, it should clearly and concisely describe the focus and a plan of your paper/project. Make your proposal as specific as possible.
Your topic proposal should contain the following parts:
1. The title of the topic proposal.
2. A descriiption of the paper/project you wish to work on.
3. A rough outline of the structure of your final report.
4. A list of references that your work will be based on. For a research paper, this list should contain
at least 5 academic publications.
The final paper/project report is due on December 6. It should have no less than 15 pages, double-spaced and not counting the title page, table of contents, bibliography, or any figures. For a research paper, it should include a bibliography of no fewer than five sources that appear as references in the body. Your paper/project report should use headings and sub-headings to reflect its structure. Please proofread your paper/report carefully to ensure that it contains no spelling or grammatical errors. It should conform to the standards of academic integrity described in our program guide and the course syllabus.
Page 3 of 4
Additional Notes
1. It is not appropriate to write on a very broad topic such as wireless security, access control, web security, authentication protocols, etc. Keep in mind that this is just a short-term paper that should fit into a limited time. You can find a textbook for most of these topics. Please choose a topic as specific as possible.
2. A review paper usually should include multiple (>=5) references. I would like to see references from referred conference proceedings or journals. IEEE and ACM databases are widely used by the research community. References such as Wikipedia can be used at the early stages when you explore a topic, but you are discouraged from using them since the information is generally considered volatile for scientific papers. Usually, you should summarize different resources instead of reiterating the exact words. It is also important to show your ability on critical thinking – I wish you include as many comments (in your own words) as possible.
4. Please note if you cite the exact words from references, you need to use quotation marks on both sides. 6. Please note that for all references and citations, you need to follow the APA format style. This is a requirement by CCE. Failing to do so may lead to the loss of points for your submission.
Students’ use of generative artificial intelligence (e.g., ChatGPT, Google Bard, DALL-E, Midjourney,
etc.) or similar resources