Week 2Literature Review – Broad Scan and Reading TemplateFollowing template…

Week 2Literature Review – Broad Scan and Reading TemplateFollowing template is only to complete broad scan and reading. Decide on a research topic and follow…

Week 2Literature Review – Broad Scan and Reading TemplateFollowing template is only to complete broad scan and reading. Decide on a research topic and follow the steps below to fill in the sections of this document. Once complete you may use it as your assignment section 2, Literature Review – Broad Scan and Reading part.Title of the project (A tentative title of selected research) Name, Student IDLiterature Review – Broad Scan and Reading (minimum 3 rounds as follows)Round 1What research interests lead you to the choice of initial keywords?Example search phrase:I am interested in cyber security and how it is applied in community policy. I would think that “community policy” and “cyber hygiene” as the keywords but returned no results. I changed to community policy and cyber security.- Keywords, source/research database, number of results returnedExample:Keywords: community policy cyber securityDatabase: IEEE ExplorerNumber of results: 40- Result (first 20+, with NO detailed abstracts)Title, author, year, journal/conference title. Highlight the articles selected for detailed/focused reading.Example search results:Document Title Authors Publication Title Year1. Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review R. Ramirez; N. Choucri IEEE Access 20162. A Dutch Approach to Cybersecurity through Participation K. Clark; D. Stikvoort; E. Stofbergen; E. van den Heuvel IEEE Security & Privacy 20143. Developing an international cooperation on cyber defense and deterrence against Cyber terrorism M. Dogrul; A. Aslan; E. Celik 2011 3rd International Conference on Cyber Conflict 20114. Designing a Formal Model Facilitating Collaborative Information Sharing for Community Cyber Security W. Zhao; G. White 2014 47th Hawaii International Conference on System Sciences 20145. State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia S. Cheang; S. Sang 2009 International Conference on Availability, Reliability and Security 20096. Unmanned aerial vehicle smart device ground control station cyber security threat model K. Mansfield; T. Eveleigh; T. H. Holzer; S. Sarkani 2013 IEEE International Conference on Technologies for Homeland Security (HST) 20137. A Computer Science course in Cyber Security and Forensics for a multidisciplinary audience W. A. Lawrence-Fowler 2013 IEEE Frontiers in Education Conference (FIE) 20138. A security model for complex applications based on normative multi-agents system H. Cheribi; M. K. Kholladi 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) 20159. Pressing pause: A new approach for international cybersecurity norm development C. Sabbah 2018 10th International Conference on Cyber Conflict (CyCon) 201810. Cyber?€?Physical Security of a Smart Grid Infrastructure Y. Mo; T. H. Kim; K. Brancik; D. Dickinson; H. Lee; A. Perrig; B. Sinopoli Proceedings of the IEEE 201211. A framework for risk-aware role based access control K. Z. Bijon; R. Krishnan; R. Sandhu 2013 IEEE Conference on Communications and Network Security (CNS) 201312. Security investment under cognitive constraints: A Gestalt Nash equilibrium approach J. Chen; Q. Zhu 2018 52nd Annual Conference on Information Sciences and Systems (CISS) 201813. ?€?Attack?€? as a term of art in international law: The cyber operations context M. N. Schmitt 2012 4th International Conference on Cyber Conflict (CYCON 2012) 201214. Optimal Attack Energy Allocation against Remote State Estimation L. Peng; L. Shi; X. Cao; C. Sun IEEE Transactions on Automatic Control 201815. Protecting privacy, civil rights and civil liberties using data labeling and segmentation T. R. Schmoyer; B. Doyle; M. Dufel; K. Higa-Smith 2015 IEEE International Symposium on Technologies for Homeland Security (HST) 201516. Sovereignty in cyberspace: Balkanization or democratization A. Cattaruzza; D. Danet; S. Taillat; A. Laudrain 2016 International Conference on Cyber Conflict (CyCon U.S.) 201617. Scaling graph community detection on the Tilera many-core architecture D. Chavarria-Miranda; M. Halappanavar; A. Kalyanaraman 2014 21st International Conference on High Performance Computing (HiPC) 201418. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet S. Wendzel; B. Kahler; T. Rist 2012 IEEE International Conference on Green Computing and Communications 201219. The Public as Partner? Technology Can Make Us Auxiliaries as Well as Vigilantes G. T. Marx IEEE Security & Privacy 201320 Context-based access control model for smart space A. Smirnov; A. Kashevnik; N. Shilov; N. Teslya 2013 5th International Conference on Cyber Conflict (CYCON 2013) 2013- Review & Summary (a paragraph of 6-10 lines)Example:1) What was your opinion after going through the list? What consideration led to the new set of keywords?My views: Many articles about cyber security, but not apparently related to community except for two articles. So new keywords shall quote community and security.2) New Keywords derived , based on the review of the search result, to be used in the next round of searchNew keywords derived: “community cyber security”3) Provide details of the articles/work identified-Title, author, year, journal/conference title, abstractThese are the most relevant articles you find in round 1 search result list. Read these articles under focused reading. Presentdetails of the articles in table format.20. Designing a Formal Model Facilitating Collaborative Information Sharing for Community Cyber Security W. Zhao; G. White 2014 47th Hawaii International Conference on System Sciences 2014Communities are becoming more vulnerable to cyber attacks as their reliance on critical cyber infrastructures is growing. Due to the interdependency among different cyber infrastructures, collaborative information sharing is necessary and important to help a community detect potential risks, prevent cyber attacks at an early stage, and facilitate incident response as well as preparedness activities in communities. In this paper we propose a group-centric collaborative information sharing framework that aims to improve community cyber security. By analyzing specific information sharing requirements in the community, we design a formal policy model for this framework. Our model is illustrated by several information sharing scenarios in the community.21. State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia S. Cheang; S. Sang 2009 International Conference on Availability, Reliability and Security 2009This paper presents background information and the progress of the government effort on Cyber Security in Cambodia. Firstly, this study establishes a framework to assess the current effort of Cambodian government on cyber security. Secondly, the results of the assessment are used to develop policy implications, serving as a roadmap to secure a national online community. Furthermore, this paper discusses the process to establish a management and technical incident response capability of the national Computer Emergency Response Team to contain on-going cyber incidents.- Appendix (need to be conducted in round 1 broad scan but to be included at the end of the document, not here) including first 20+ returned search including detailed abstractsTitle, author, year, journal/conference title, abstractRound 2- List keywords, derivedin round 1, source/research database, number of results returnedo Keywords: “community cyber security”o Database: IEEE Explorero Number of results: 9- List out result: Up to 20search results list, presented in table formatwith no detailed abstractsTitle, author, year, journal/conference title- Review & Summary (a paragraph of 6-10 lines)What was your opinion after going through the list, what consideration led to the new set of keywords?- List out the new keywords derived.- Detail reading article/work identified-Title, author, year, journal/conference title, abstractThese are the most relevant articles you find in round 2 search result list. Read these articles under focused reading. Presentdetails of the articles in table format.- Appendix (need to be conducted in round 2 broad scan but to be included at the end of the document, not here) including first 20+ returned search including detailed abstractsTitle, author, year, journal/conference title, abstractRound 3- Keywords, come from round 2, source/research database, number of results returned- List out result: Up to 20search results list, presented in table formatwith no detailed abstractsTitle, author, year, journal/conference title- Review & Summary(a paragraph of 6-10 lines)What was your opinion after going through the search results list?What consideration led to the new set of keywords?- List out the new keywords derived.- Provide details of the articles/work identified-Title, author, year, journal/conference title, abstractThese are the most relevant articles you find in round 3 search result list. Read these articles under focused reading. Presentdetails of the articles in table format.- Appendix (need to be conducted in round 3 broad scan but to be included at the end of the document, not here) including first 20+ returned search including detailed abstracts- Title, author, year, journal/conference title, abstractAppendixA1. Round 1 Broad Scan, keyword, source/research database, number of results returned20+ Title, author, year, journal/conference titleWith abstractExample outcomes:Keywords: community policy cyber securityDatabase: IEEE ExplorerNumber of results: 40A2. Round 2 Broad Scan, keyword, source/research database, number of results returnedUp to 20 results, Title, author, year, journal/conference titleWith abstractA3. Round 3 Broad Scan, keyword, source/research database, number of results returnedUp to 20r,esults Title, author, year, journal/conference titleWith abstract Let’s block ads! (Why?)

Do you need any assistance with this question? Send us your paper details now We’ll find the best professional writer for you!

 

error: Content is protected !!