Difference between revisions of "UNIK4750/List of papers - 2018"
(Created page with "== Evaluation criteria == Your presentation is expected to last for 15 minutes, you will be stopped at 16:00. That means you need to identify the key messages of the selected...") |
(→List of papers for UNIK 4750) |
||
(9 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | |||
+ | == !Paper presentation after the winter holiday, 1st of March! == | ||
+ | |||
+ | |||
== Evaluation criteria == | == Evaluation criteria == | ||
Your presentation is expected to last for 15 minutes, you will be stopped at 16:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min. | Your presentation is expected to last for 15 minutes, you will be stopped at 16:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min. | ||
Line 31: | Line 35: | ||
:2) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"] | :2) [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6142258&queryText=internet%20of%20things%20security&sortType=desc_p_Citation_Count&searchField=Search_All Zhu, B., Joseph, A, and Sastry, S., "A Taxonomy of Cyber Attacks on SCADA Systems"] | ||
− | :3) [http://link.springer.com/article/10.1007/s11227-015-1547-0 Jeong Yeon, Yanghoon Kim, "Benefits of cloud computing adoption for smart grid security from security perspective"] | + | Bikram :3) [http://link.springer.com/article/10.1007/s11227-015-1547-0 Jeong Yeon, Yanghoon Kim, "Benefits of cloud computing adoption for smart grid security from security perspective"] |
:4) [http://link.springer.com/chapter/10.1007/978-3-319-49148-6_6 Wenlin Han, Yang Xiao, "Big Data Security Analytic for Smart Grid with Fog Nodes"] | :4) [http://link.springer.com/chapter/10.1007/978-3-319-49148-6_6 Wenlin Han, Yang Xiao, "Big Data Security Analytic for Smart Grid with Fog Nodes"] | ||
Line 55: | Line 59: | ||
:14) [http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"] | :14) [http://aircconline.com/ijnsa/V8N2/8216ijnsa06.pdf Elkhodr, Mahmoud ; Shahrestani, Seyed ; Cheung, Hon, "The Internet of Things : New Interoperability, Management and Security Challenges"] | ||
− | :15) [http://ieeexplore.ieee.org/document/7562568/ Mohsen Nia, A., Jha, N.K., "A Comprehensive Study of Security of Internet-of-Things"] | + | Andreas :15) [http://ieeexplore.ieee.org/document/7562568/ Mohsen Nia, A., Jha, N.K., "A Comprehensive Study of Security of Internet-of-Things"] |
:16) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"] | :16) [https://thesai.org/Downloads/Volume7No12/Paper_54-Software_Defined_Security_Service_Provisioning.pdf Idris, Faraz, Hameed, Sufian, "Software Defined Security Service Provisioning Framework for Internet of Things"] | ||
− | :17) [http://www.sciencedirect.com/science/article/pii/S0267364916301169 Weber, Rolf H., Studer, Evelyne, "Cybersecurity in the Internet of Things: Legal aspects"] | + | Sondre :17) [http://www.sciencedirect.com/science/article/pii/S0267364916301169 Weber, Rolf H., Studer, Evelyne, "Cybersecurity in the Internet of Things: Legal aspects"] |
:18) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"] | :18) [http://ieeexplore.ieee.org/document/7478513/ Ali, Mazhar et al., "Security and Dependability of Cloud-Assisted Internet of Things"] | ||
Line 71: | Line 75: | ||
:22) [http://ieeexplore.ieee.org/document/7917637/ Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned] | :22) [http://ieeexplore.ieee.org/document/7917637/ Anna Sojka-Piotrowska, Peter Langendörfer, Shortening the security parameters in lightweight WSN applications for IoT - lessons learned] | ||
− | :23) [http://ieeexplore.ieee.org/document/8114479/ Goran Pulkkis et al., "Secure and Reliable Internet of Things Systems for Healthcare"] | + | Simen :23) [http://ieeexplore.ieee.org/document/8114479/ Goran Pulkkis et al., "Secure and Reliable Internet of Things Systems for Healthcare"] |
− | :24) [http://ieeexplore.ieee.org/document/8123562/ Manuel Barbosa et al., "SAFETHINGS: Data Security by Design in the IoT"] | + | Christoffer, :24) [http://ieeexplore.ieee.org/document/8123562/ Manuel Barbosa et al., "SAFETHINGS: Data Security by Design in the IoT"] |
:25) [http://ieeexplore.ieee.org/document/8188589/ Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"] | :25) [http://ieeexplore.ieee.org/document/8188589/ Botir Usmonov et al., "The cybersecurity in development of IoT embedded technologies"] | ||
Line 79: | Line 83: | ||
:26) [http://ieeexplore.ieee.org/document/8070757/ Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"] | :26) [http://ieeexplore.ieee.org/document/8070757/ Vishwesh Nagamalla, Aruna Varanasi, "A review of security frameworks for Internet of Things"] | ||
− | :27) [http://ieeexplore.ieee.org/document/8058301/ P. Vagdevi et al., "Home: IOT based home automation using NFC"] | + | Rambi :27) [http://ieeexplore.ieee.org/document/8058301/ P. Vagdevi et al., "Home: IOT based home automation using NFC"] |
:28) [http://ieeexplore.ieee.org/document/8038504/ Hammad Iqbal et al., "Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper"] | :28) [http://ieeexplore.ieee.org/document/8038504/ Hammad Iqbal et al., "Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper"] | ||
Line 93: | Line 97: | ||
:33) [http://ieeexplore.ieee.org/document/8259697/ Mohammed Rebbah et al., "Intrusion detection in Cloud Internet of Things environment"] | :33) [http://ieeexplore.ieee.org/document/8259697/ Mohammed Rebbah et al., "Intrusion detection in Cloud Internet of Things environment"] | ||
− | :34) [http://ieeexplore.ieee.org/document/7917634/ Ali Dorri et al., "Blockchain for IoT security and privacy: The case study of a smart home"] | + | Salman :34) [http://ieeexplore.ieee.org/document/7917634/ Ali Dorri et al., "Blockchain for IoT security and privacy: The case study of a smart home"] |
:35) [https://www.sciencedirect.com/science/article/pii/S1877050917317246 Salaheddin Darwish et al., "Towards Composable Threat Assessment for Medical IoT (MIoT)"] | :35) [https://www.sciencedirect.com/science/article/pii/S1877050917317246 Salaheddin Darwish et al., "Towards Composable Threat Assessment for Medical IoT (MIoT)"] | ||
Line 99: | Line 103: | ||
:36) [https://www.sciencedirect.com/science/article/pii/S2314728816300149 Partha Pratim Ray, "A Survey of IoT Cloud Platforms"] | :36) [https://www.sciencedirect.com/science/article/pii/S2314728816300149 Partha Pratim Ray, "A Survey of IoT Cloud Platforms"] | ||
− | :37) [https://www.sciencedirect.com/science/article/pii/S2212827116307880 D. Mourtzis et al., "Industrial Big Data as a Result of IoT Adoption on Manufacturing"] | + | Junaid :37) [https://www.sciencedirect.com/science/article/pii/S2212827116307880 D. Mourtzis et al., "Industrial Big Data as a Result of IoT Adoption on Manufacturing"] |
:38) [https://www.sciencedirect.com/science/article/pii/S1877050916302721 Nonhlanhla Ntuli, Adnan Abu-Mahfouz, "A Simple Security Architecture for Smart Water Management System"] | :38) [https://www.sciencedirect.com/science/article/pii/S1877050916302721 Nonhlanhla Ntuli, Adnan Abu-Mahfouz, "A Simple Security Architecture for Smart Water Management System"] | ||
Line 107: | Line 111: | ||
:40) [https://www.sciencedirect.com/science/article/pii/S2351978917306820 T. Pereira et al., "Network and Information Security Challenges Within Industry 4.0 Paradigm"] | :40) [https://www.sciencedirect.com/science/article/pii/S2351978917306820 T. Pereira et al., "Network and Information Security Challenges Within Industry 4.0 Paradigm"] | ||
+ | +1 Bendik: [https://link.springer.com/chapter/10.1007%2F978-3-319-28077-6_12 Jonida Milaj, Jeanne Pia Mifsud Bonnici, "Privacy Issues in the Use of Smart Meters—Law Enforcement Use of Smart Meter Data"] | ||
</big> | </big> |
Latest revision as of 22:28, 28 February 2018
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
!Paper presentation after the winter holiday, 1st of March!
Evaluation criteria
Your presentation is expected to last for 15 minutes, you will be stopped at 16:00. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min.
Your presentation will be evaluated with respect to the following criteria:
Knowledge and Overview over topics in the paper
- what is the paper about, which specific aspects are addressed?
Identification of key findings of the paper:
- why are the findings key findings, to what extend are they different from the state-of-knowledge?
- what are the strengths/weaknesses of the approaches being mentioned
Scientifically precise presentation
- Be precise in your formulations, avoid story telling.
- Use numbers where appropriate, e.g. 20% more instead of much more
Evaluation of the paper
- what is your take on the paper? Criticism, own thoughts,...
Style:
- clear structure, clear and concise slides
- Provide examples, and respect the time
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 12) Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"
Andreas :15) Mohsen Nia, A., Jha, N.K., "A Comprehensive Study of Security of Internet-of-Things"
Sondre :17) Weber, Rolf H., Studer, Evelyne, "Cybersecurity in the Internet of Things: Legal aspects"
- 20) Anna Kornfeld Simpson et al., "Securing Vulnerable Home IoT Devices With an In-hub Security Manager
Simen :23) Goran Pulkkis et al., "Secure and Reliable Internet of Things Systems for Healthcare"
Christoffer, :24) Manuel Barbosa et al., "SAFETHINGS: Data Security by Design in the IoT"
Rambi :27) P. Vagdevi et al., "Home: IOT based home automation using NFC"
- 29) Thales L. von Sperling et al., "Tracking intruders in IoT networks by means of DNS traffic analysis"
Salman :34) Ali Dorri et al., "Blockchain for IoT security and privacy: The case study of a smart home"
Junaid :37) D. Mourtzis et al., "Industrial Big Data as a Result of IoT Adoption on Manufacturing"