This course engages students in national cybersecurity and information systems security problems. Students will learn how to apply research techniques, think clearly about these issues, formulate and analyze potential solutions, and communicate their results. Working in small groups under the mentorship of technical clients from government and industry, each student will formulate, carry out, and present original research on current cybersecurity and information assurance problems of interest to the nation. Support for this course is provided in part by the National Science Foundation under grant #1344369. As part of the award, this course will be run in a synchronized distance fashion, coordinating some activities with our partner schools (Purdue University, Carnegie-Mellon University, Dakota State University, Iowa State University, Mississippi State University, Northeastern University, University of Texas–Dallas, Stevens University, and University of Maryland–Baltimore County) and our technical clients.
Project topics may come from lists of problems supplied by government or industrial partners. All proposals must be approved by the instructor.
The main deliverables are a written technical report and an oral presentation describing the team’s new and significant findings (similar in form and length to those from technical research conferences such as USENIX Security). The teams and technical mentors may agree on other deliverables as well. Each student is expected to participate actively in class.
By the end of the course, students will be expected to:
This course rests in part on the following principles.
Along with each assignment, we will make the rubric used to grade that assignment available. Typically, it will be on the assignment itself.
The assignments for the first quarter are weighted as follows:
Assignment | Weight | Assignment | Weight | |
---|---|---|---|---|
Project bids | 10% | Progress report | 20% | |
Project proposal | 20% | Progress report presentation | 10% | |
Literature review | 20% | Instructor's assessment | 20% |
The assignments for the second quarter are weighted as follows:
Assignment | Weight | Assignment | Weight | |
---|---|---|---|---|
Penultimate report | 20% | Final report | 40% | |
Penultimate presentation | 10% | Final presentation | 10% | |
Instructor's assessment | 20% |
The project will be evaluated on the basis of scientific merit, effective presentation, and appropriateness to the assignment, weighted as follows:
The instructor’s assessment will include the level and quality of participation and feedback from the client.
Please submit your work through SmartSite. We will grade it and return the grades, with our comments, on SmartSite.
Late work affects others. Peer review is an important aspect of the course, and peer review requires coordinating schedules, including among different universities. Some projects may depend on other projects. To complete the project by the end of the term, it is important to complete each milestone on time. Professional researchers often have deadlines to meet.
If you are one day late, there will be no penalty other than the opprobrium of the instructor and your fellow students. If you are more than one day late, the instructor reserves the right to deduct points — the exact penalty has not yet been determined (but will probably be something like 20% from the full score per day late).
Should you encounter an unanticipated or uncontrollable event that may prevent you from meeting a deadline, please let me know immediately, and request an extension.
One of the course outcomes is to communicate effectively with professional audiences of various types. This requires that one take personal pride in their work, and be held accountable for professional quality work. To this end, we expect your submitted work to meet the following requirements.
You can also obtain a PDF version of this. | Version of January 15, 2015 at 1:53PM |
ECS 289M, Introduction to Research in Computer and Information Security Winter Quarter 2015 |