Security代写:ECE544ThrustworthyComputing


从给定的研究方向中选择一个,代写关于可信计算的研究性作业的测试用例部分的代码。

Goals

The goal of the final project is to pursue research in a specific narrow topic
in trustworthy computing, learn how to write a good research proposal and
improve your presentation skills. The project will be done in groups (ECE 544
students in groups of 2 students and ECE 644 in groups of 3 students).
Please be cognizant of the fact that this project includes more than surveying
a topic. You need to propose a “semi-new” concept. Do not be afraid to dare,
even if the proposed concept is not new, but you defend it well and layout a
good plan, you will get the full credit. This is NOT a MS or PhD proposal in
which the topic has to be entirely unexplored. We will emphasize in our
grading the fact that you have written the proposal well, explained your
goals, the literature is surveyed well (not comprehensive, but what you
surveyed is done well) and the proposed concept is exposed clearly. It is
highly important to correlate your ideas with the existing works by showing
concrete citations.
Any work that cogs well with the existing work will be given high value. In
this document we provide a list of suggested topics as well as guidelines for
the proposal writing. Please read the rest of the document carefully.
We will provide more details on Phase I, Phase II, Phase III and the
presentation.

Suggested Research Topics

Here is a list of suggested general topics which include applications of
trustworthy computing as well as technology developments. You are welcome to
pick your own topic.

  1. Cyber security mitigation techniques for critical infrastructures such as banking and finance, communications, emergency services, energy, food chain, health, mass gatherings, transport and water (pick a specific industry segment)
  2. Secure software distribution
  3. Security in Emergency Situations (e.g. DIORAMA system)
  4. Payment via Mobile Phones
  5. Secure body sensor devices
  6. Security in implantable devices
  7. Secure healthcare web services
  8. Secure Instant Messaging
  9. Virtual Private Network for TCP and/or UDP packets using your own cryptographic code
  10. Secure Wearable Device (e.g. Apple Watch, Android Watch)
  11. Secure message distribution system in Green Buildings (e.g. computer energy managed building)
  12. Secure power distribution systems
  13. Secure Assistive Technology (e.g. PERCEPT)
  14. Cyber forensics
  15. Security in vehicular networks
  16. Mobile evidence preservation and examination
  17. Watermarking and intellectual property theft
  18. Network traffic analysis, traceback and attribution
  19. Network incidents response, investigation and evidence handling
  20. Biometrics related to cyber security
  21. Security for Internet of Things
  22. Cloud security
  23. Content Protection and Digital Rights Management
  24. Security and privacy in Social Networks
    Please use the IEEE Explore database through the UMASS library. It includes a
    vast repository of papers with a powerful search engine.Please use the IEEE
    Explore database through the UMASS library. It includes a vast repository of
    papers with a powerful search engine.

Phase I

Submit through moodle a topic that you picked including a number of sentences
(up to 1⁄2 page) that describe the topic as well as a list of preliminary
references (conference and journal papers, books, web sites, etc).
ECE 644 students: include a detailed description of the system/application as
detailed in the Appendix.

Phase II

Each group will submit a preliminary report containing 6 pages that outlines
your proposal along with sound background study needs to be submitted. The
preliminary report should contain an abstract, specific aims, background and
significance and proposed work.
Each group will have a 5-10 minutes presentation during class time (check the
web site for your assigned slot).
ECE 644 students: implement a client-server architecture and submit it on
Moodle (see details in the Appendix).

Phase III

All students will submit a final report which should be up to 15 pages.
ECE 644 students: Featured presentations will take place. Final project review
of the working demo will take place.

Proposal Format

The proposal will follow the NIH PHS 398 guidelines and includes the following
sections:

  1. Abstract
  2. Specific Aims
  3. Background and significance
  4. Preliminary studies
  5. Research design and methods
  6. Implementation details or Test Bed
  7. Literature cited
    More description on each one of the sections.

Abstract

It should contain a summary of the whole work along with general motivation.
It should also briefly discuss the advantages of your system.
Phase III: One page is recommended.

Specific Aims

List the broad, long-term objectives and the goal of the specific research
proposed, e.g., create a novel design, solve a specific problem, challenge an
existing paradigm or develop new technology.
Phase III: One page is recommended

Background and Significance

Briefly sketch the background leading to this proposal, critically evaluate
existing knowledge. State concisely the importance of the research described
in this proposal by relating the specific aims to the broad, long-term
objectives. If the aims of the application are achieved, state how scientific
knowledge will be advanced.
Phase III: Three to five pages are recommended.

Preliminary Studies

In this project our preliminary studies part will be minimal, unlike the
“real” NIH applications (in “real: NIH applications this is the most important
part that established the experience and competence of the investigator to
pursue the proposed project). Describe here one or more papers that are the
most similar to the proposed approach which you will provide in the next
section.
Phase III: Three to five pages are recommended.

Research Design and Methods

Describe the research design conceptual framework, procedures, and analyses to
be used to accomplish the specific aims of the project. Include how the data
will be collected, analyzed, and interpreted. Describe any new methodology and
its advantage over existing methodologies. Describe any novel concepts,
approaches, tools, or technologies for the proposed studies. Discuss the
potential difficulties and limitations of the proposed procedures and
alternative approaches to achieve the aims.
Phase III: Two to three pages are recommended.

Implementation Details or Test Bed

You should come up with a system architecture or software design.
ECE 544 students: implementation details of a “proof of concept” are
mandatory, whereas the implementation is not.
ECE 644 students: your project needs to include an implementation.
Implementation guidelines are presented in the Appendix.
Phase III: Two to three pages are recommended.


文章作者: SafePoker
版权声明: 本博客所有文章除特別声明外,均采用 CC BY 4.0 许可协议。转载请注明来源 SafePoker !
  目录