Computer Science
Group Project
Research Proposal. Your written report must demonstrate (i) your critical understanding of at least 5 research articles and (ii) a novel research idea in the respective topic your group has chosen. The group size is 2. To see a potential list of articles, click here. At least one article in your report must be from this list. The deadline to submit your research proposal (including a tentative report title and your 1-paragraph research proposal) is: Friday, July 30, 23:59 hrs NZ time. To submit your research proposal, first you need to choose a Canvas group project then you can submit the proposal.
Final Report. The final report should be around 7 pages but not more than 10 pages (including references). You should use a single column, single spacing, 1-inch margin, Times New Roman font with 12-point font size. All reports must be written in English, and should be submitted in PDF via Canvas. The deadline to submit your final report is: Wednesday, October 20, 23:59 hrs NZ time Friday, October 22, 17:00 hrs NZ time. The report must be submitted via Canvas. While submitting your final report, you also have to mention percentage contribution of each member and a list of tasks each group member was involved in.
The final report should include the abstract (~1 paragraph), introduction (1.5-2 pages), related work (1.5-2 pages), proposed idea (2-3 pages), and conclusion (0.5 page). The references should also be included.
The weight of your final report is 25%. There are 100 marks for the report covering the abstract (5 marks), introduction (15 marks), related work (25 marks), proposed idea (50 marks), and conclusion (5 marks).
The abstract should have at least 5 sentences: one for the context, one for the problem, one for the state-of-the-art, one for solution and one to highlight the novelty of your solution. Each aspect is worth 1 mark. Each aspect should be clear and convincing. The introduction should cover these 5 aspects, but each aspect should be extended to one paragraph. Each aspect is worth 3 marks, and will be evaluated depending on clarity and explanation of your description.
In related work, you should review 5 ‘strong’ research articles related to your work. There should be one paragraph for each article. In each paragraph, you should summarise the article in your own words and should compare it with your proposed idea, justifying how your approach is different or better. Each related work is of 5 marks. It will be evaluated depending on comprehensiveness of your summary as well as your criticism and comparison.
In the proposed idea section, the core idea along with technical details should be presented. The main technique should be clear. If necessary, use figures, tables, and graphs. How your idea solved the problem and is better than others should be justified. This section is worth 50 marks. You can get full marks in this section if your description is clear, if your idea is novel, and if your argumentation is convincing. You can get bonus marks if you implement your proposed scheme and compare it with existing solutions.
Finally, you should summarise the idea and share some future work. This section is worth 5 marks, and it will be evaluated based on clarity of your summary (2 marks) and worthiness of your future work (3 marks).
Group Reports
Member 1 | Member 2 | Title |
---|---|---|
Lucas Betts | Denise Jarry | A Framework Based Approach to Solve the Threat of Link Preview Content Inconsistency |
Nicholas Berg | Ken Fang | Privacy-preserving Certificate Revocation Check |
Jordan He | Zain Khan | Improving DNS Security against Stealthy Hijacking using Extended DoH |
Shiv Prasad | Paul Fitzgerald | Mitigating IoT Malware Propagation Through Interception of Malicious Payloads Using Deep Packet Inspection Techniques |
Allen Zhao | Louis Wang | Improving Browser Security against HTTPS Context Confusion (SCC) attack using Enhanced HSTS |
Peirong Zhao | Hongyi Lu | Mitigating DNS Poisoning Cache Attacks using Extended DNSSEC |
Ingemar Watt | Oliver Chamberlain | Mitigating URL-based Cyber Attacks using Inspection and Verification |
Courtney Hunter | Gemma Lowe | Detecting Mirai-based IoT Malware using Machine Learning Techniques in Real Time |
Aditya Krishnan | Haoyu Zhang | Reducing DNS Query Data Leakage using Extended DNS over TLS |
Samuel Boyes | Stephen Brough | Expanding CRLite: Revoking Cross-signed Certificates |
-
Related Programmes