Difference between revisions of "TEK5530/List of papers"

From its-wiki.no
Jump to: navigation, search
Line 30: Line 30:
 
<big>
 
<big>
  
 +
 +
List of Papers 2021
  
 
:1) [http://ieeexplore.ieee.org/document/7998185/ Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"]
 
:1) [http://ieeexplore.ieee.org/document/7998185/ Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"]

Revision as of 22:31, 27 January 2021

Back to TEK5530

Evaluation criteria

Your presentation is expected to last for 25 minutes, you will be stopped at 26:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 30 min.

Your presentation will be evaluated with respect to the following criteria:

Knowledge and Overview over topics in the paper

  • what is the paper about, which specific aspects are addressed?

Identification of key findings of the paper:

  • why are the findings key findings, to what extend are they different from the state-of-knowledge?
  • what are the strengths/weaknesses of the approaches being mentioned

Scientifically precise presentation

  • Be precise in your formulations, avoid story telling.
  • Use numbers where appropriate, e.g. 20% more instead of much more

Evaluation of the paper

  • what is your take on the paper? Criticism, own thoughts,...

Style:

  • clear structure, clear and concise slides
  • Provide examples, and respect the time

The quality of your presentation will weigh 20% of your final grade.

List of papers for TEK5530

Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature


List of Papers 2021

1) Fari Assaderaghi et al., "Privacy and Security: Key Requirements for Sustainable IoT Growth"
2) Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned
3) Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"
4) Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"
5) Thales L. von Sperling et al., "Tracking intruders in IoT networks by means of DNS traffic analysis"
6) Radek Krejci et al., "Security survey of the IoT wireless protocols"
7) Markus Endler et al., "An approach for secure edge computing in the Internet of Things"
8) Mohammed Rebbah et al., "Intrusion detection in Cloud Internet of Things environment"
9) Partha Pratim Ray, "A Survey of IoT Cloud Platforms"
10) Arbia Riahi Sfar et al., "A Roadmap for Security Challenges in the Internet of Things"
11) R Gurunath et al., "An Overview: Security Issue in IoT Network"
12) Tran Anh Khoa et al., "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study"
13) Rim Marah et al., "Security of Smart Grid Management of Smart Meter Protection"
14) Yuvaraj S Patil et al., "EGSP: Enhanced Grid Sensor Placement Algorithm for Energy Theft Detection in Smart Grids"
15) Liping Chen et al., "Cloud Service Risk in the Smart Grid"


Back to TEK5530