Difference between revisions of "UNIK4750/List of papers"
From its-wiki.no
Josef.Noll (Talk | contribs) m (→List of papers for UNIK 4750) |
Josef.Noll (Talk | contribs) (→Evaluation criteria) |
||
Line 60: | Line 60: | ||
Your presentation is expected to last for 15-20 min (not longer). That means you need to find the key | Your presentation is expected to last for 15-20 min (not longer). That means you need to find the key | ||
of one of the above papers will be evaluated with respect to the following criteria: | of one of the above papers will be evaluated with respect to the following criteria: | ||
− | * Identification of key findings of the paper | + | * Knowledge and Overview over topics in the paper: ''what is the paper about, which specific aspects are addressed?'' |
− | * | + | * Identification of key findings of the paper: ''why are the findings key findings, to what extend are they different from the state-of-knowledge?'' |
+ | * Scientifically precise presentation: ''don't tell stories, be precise in your formulations. Use numbers where appropriate, e.g. 20% more'' | ||
+ | * Evaluation of the paper: ''what is your take on the paper? Criticism, own thoughts,...'' | ||
+ | * Style: ''Provide clear and concise slides, with examples, and respect the time'' |
Revision as of 18:00, 4 February 2016
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 2) Per Christian - K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
- 9) Sriramreddy Baddam - Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
- 12) Kim Jonatan Wessel Bjørneset - Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
- 26) Farooq Abdullah - Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"
Evaluation criteria
Your presentation is expected to last for 15-20 min (not longer). That means you need to find the key of one of the above papers will be evaluated with respect to the following criteria:
- Knowledge and Overview over topics in the paper: what is the paper about, which specific aspects are addressed?
- Identification of key findings of the paper: why are the findings key findings, to what extend are they different from the state-of-knowledge?
- Scientifically precise presentation: don't tell stories, be precise in your formulations. Use numbers where appropriate, e.g. 20% more
- Evaluation of the paper: what is your take on the paper? Criticism, own thoughts,...
- Style: Provide clear and concise slides, with examples, and respect the time