Difference between revisions of "UNIK4750/List of papers - 2017"
(→List of papers for UNIK 4750) |
(→List of papers for UNIK 4750) |
||
Line 80: | Line 80: | ||
+1 (Itendra) "Wireless Sensor Networks and the Internet of Things: Selected Challenges" by Delphine Christin, Andreas Reinhardt, Parag S. Mogre and Ralf Steinmetz | +1 (Itendra) "Wireless Sensor Networks and the Internet of Things: Selected Challenges" by Delphine Christin, Andreas Reinhardt, Parag S. Mogre and Ralf Steinmetz | ||
+ | |||
+ | +1 (Shukun) Garcia-Morchon, Oscar, et al. "Security considerations in the IP-based Internet of Things." (2017) | ||
</big> | </big> |
Revision as of 14:00, 28 February 2017
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
List of papers for UNIK 4750
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. Read more on: Guide on how to search for Literature
- 2) (Hans Jørgen) Kapersky Industrial Control Systems Vulnerabilities Statistics
- 5) HyungJun Kim, "Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks"
- 21) (Kim Bjørneset) CISCO, "Securing the Internet of Things: A proposed framework"
- 22) (Christian) SANS Institute, "Securing the Internet of Things Survey"
- 24) Langer, Lucie et al., "From old to new: Assessing cybersecurity risks for an evolving smart grid"
- 25) (Quihao) Bassam Moussa, "Security Assessment of Time Synchronization Mechanisms for The Smart Grid"
- 32) (Marius) Weber, Rolf H., Studer, Evelyne, "Cybersecurity in the Internet of Things: Legal aspects"
+1 (Ole Christian) "IoT Security and Privacy Recommendations" by BITAG,
+1 (Khagen) Kai Zhao, LinaGe, "A Survey on the Internet of Things Security"
+1 (Ashish) A. A. Khan, M. H. Rehmani and A. Rachedi, "When Cognitive Radio meets the Internet of Things?," 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 469-474.
+1 (Desta) "Threat Analysis of IoT Networks Using Artificial Neural Network Intrusion Detection System"
+1 (Itendra) "Wireless Sensor Networks and the Internet of Things: Selected Challenges" by Delphine Christin, Andreas Reinhardt, Parag S. Mogre and Ralf Steinmetz
+1 (Shukun) Garcia-Morchon, Oscar, et al. "Security considerations in the IP-based Internet of Things." (2017)
Evaluation criteria
Your presentation is expected to last for 15 minutes, you will be stopped at 15:30 (we have many students this year and have to keep the schedule). That means you need to identify the key messages of the selected paper.
Your presentation will be evaluated with respect to the following criteria:
Knowledge and Overview over topics in the paper
- what is the paper about, which specific aspects are addressed?
Identification of key findings of the paper:
- why are the findings key findings, to what extend are they different from the state-of-knowledge?
- what are the strengths/weaknesses of the approaches being mentioned
Scientifically precise presentation
- Be precise in your formulations, avoid story telling.
- Use numbers where appropriate, e.g. 20% more
Evaluation of the paper
- what is your take on the paper? Criticism, own thoughts,...
Style:
- clear structure, clear and concise slides
- Provide examples, and respect the time