Difference between revisions of "UNIK4750/List of papers"
From its-wiki.no
Josef.Noll (Talk | contribs) (→List of papers for UNIK 4750) |
Josef.Noll (Talk | contribs) (→List of papers for UNIK 4750) |
||
Line 51: | Line 51: | ||
:23) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"] | :23) [https://www.capgemini.com/resource-file-access/resource/pdf/securing_the_internet_of_things_opportunity_putting_cyber_security_at_the_heart_of_the_iot.pdf Gapgemini Consulting, "Securing the Internet of Things - Opportunity: Putting Cybersecurity at the Heart of the IoT"] | ||
− | :24) [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"] | + | :24) '''Alina Lapina''' - [https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf Meltzer, D., "Securing the Industrial Internet of Things"] |
:25) '''Raul''' - [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"] | :25) '''Raul''' - [https://www.nics.uma.es/pub/seciot10/files/pdf/ghani_seciot10_paper.pdf Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G., and Clarke, J., "Assessing the Security of Internet Connected Critical Infrastructures"] |
Revision as of 09:44, 12 February 2016
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
back to UNIK4750
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 2) Per Christian - K. Zhao and L. Ge, "A Survey on the Internet of Things Security"
- 8) Marit Iren R. Tokle - Khan, R., Khan, S.U., Zaheer, R., and Khan, S., "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges"
- 9) Sriramreddy Baddam - Trappe, W., Howard, R., and Moore, R.S., "Low-Energy Security: Limits and Opportunities in the Internet of Things"
- 11) Hafiz Muhammad Gulzar - Margulies, J., "Garage Door Openers: An Internet of Things Case Study"
- 12) Kim Jonatan Wessel Bjørneset - Bruno, C., Guidi, L., Lorite-Espejo, A., and Pestonesi, D., "Assessing a Potential Cyberattack on the Italian Electric System"
- 24) Alina Lapina - Meltzer, D., "Securing the Industrial Internet of Things"
- 26) Farooq Abdullah - Baig, Z.A., "Securing the Internet of Things Infrastructure - standards and techniques"
Evaluation criteria
Your presentation is expected to last for 15-20 min (not longer). That means you need to identify the key messages of the selected paper. Your presentation will be evaluated with respect to the following criteria:
Knowledge and Overview over topics in the paper
- what is the paper about, which specific aspects are addressed?
Identification of key findings of the paper:
- why are the findings key findings, to what extend are they different from the state-of-knowledge?
- what are the strengths/weaknesses of the approaches being mentioned
Scientifically precise presentation
- Be precise in your formulations, avoid story telling.
- Use numbers where appropriate, e.g. 20% more
Evaluation of the paper
- what is your take on the paper? Criticism, own thoughts,...
Style:
- clear structure, clear and concise slides
- Provide examples, and respect the time