The first step consists of choosing a subject (any subject related to the information security field), introducing it in the introduction section
The first step consists of choosing a subject (any subject related to the information security field), introducing it in the introduction section (from general domain to specific field), and starting your literature review (existing researches already done on the subject chosen) by describing these researches briefly (at least 4 references). Do not forget to insert the references in your document.
You need to prepare a word document including all information gathered (included directly in your report, 3 – 4 pages) and prepare slides to present progress (8 – 10 slides). A non-exhaustive list of subjects is the following:
Improvement of security in IoT and mobile apps
software security testing
software vulnerabilities analysis
software security evaluation methods
software security metrics and benchmarking
software security requirements modeling
Enhancement of security in Electronic Currency Payment
Forensics Analysis of snapchat and similar applications
Ransomware
readiness of organizations
reverse engineering of some real ranswomware
Trust based system Management in Routing protocol in WSNs.
Software Defined Networking (SDN) vulnerabilities.
Cryptographic techniques under cloud systems
Encryption in Real-time/IP Telephony (VoIP)
Security issues in Wireless Body Network (WBN)
Integrated Threat Modelling: How to model Threats?
End-To-End Verifiability in Electronic Elections
Study the applicability of electronic voting systems such as helios
How information from honeypots can be used to improve network security.
Design and Implementation of 3D Localization System. In the world of Internet of Things accurate indoor and outdoor localization of people and assets is not just desirable, but an imperative feature for a number of security- and safety-critical systems. In this project, we will explore the limits of accurate and secure 3D localization using an in-house purpose-built sensor module with an Ultra-Wide Band (UWB) chipset and several sensors (e.g., Accelerometer, Gyroscope). The project goal is to build a complete 3D localization system based on state-of-art time-of-flight ranging UWB aided by sensor fusion, deploy it in scalable real-life scenarios and study the behavior. Both infrastructure-based and infrastructure-free approaches will be explored. Upon exceptional successful completion of the project, preparation for participating in the Microsoft Indoor Localization Competition 2016 will be considered.
Malicious Infrastructure Analysis:
Malicious networks are increasingly abusing Internet infrastructure to perform illicit activities. Recent studies indicate that botnets are the primary platform through which cyber criminals create global cooperative networks that are instrumental in most cyber criminal attacks. Dynamic malware analysis provides valuable insight into such malicious activities and helps security experts detect and protect against many cyber attacks.
Objectives: Deriving cyber threat intelligence from dynamic malware analysis to reveal more insights about different cyber attacks.
Expected Results: Reveal malicious networks with their characteristics.
Cyber Threat Intelligence Framework
There are many security tools with different objectives which need to be aggregated in one framework to provide the complete picture security threats.
(https://github.com/hslatman/awesome-threat-intelligence)
Objectives: Integrate different open source tools in an intelligent framework
Expected Results: The framework need to generate insightful information about different security threats. Real dataset (malicious) can be used to test the framework.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
