special topics in computer applications

13
Special topics in computer applications Taekyoung Kwon [email protected] 880-9105

Upload: zelenia-jarvis

Post on 02-Jan-2016

27 views

Category:

Documents


3 download

DESCRIPTION

Special topics in computer applications. Taekyoung Kwon [email protected] 880-9105. Attendance check Email Mobile phone number Advisor. Overview. goals of this class Get familiar with two topics Pervasive computing Network security - PowerPoint PPT Presentation

TRANSCRIPT

Special topics in computer applications

Taekyoung Kwon

[email protected]

880-9105

• Attendance check– Email– Mobile phone number– Advisor

Overview

• goals of this class – Get familiar with two topics

• Pervasive computing

• Network security

– Present and discuss the pros and cons of the state-of-the-art proposals

– Propose a new scheme and compare with the related work

• reference materials

– related papers

– other documents (e.g. standardization documents)

overview

• Lectures

– Maybe a little bit

• Two presentations

• Term project

• English

– Q & A can be Korean

• Pre-requisite (not so mandatory)

– Computer network or equivalent courses

Tentative list of topics (1/2)

• Ubiquitous/Pervasive computing

candidates• Mobility/multi-interface/Multicasting/broadcasting• Context-awareness

– Localization, Other sensors

• Security/privacy• New applications

– Lockitron, Nike Fuelband,…– Cough sensing, BeWell,…

• Augmented reality• New networks

– Sensor network, vehicular network,…

• energy issues• Human computer interface (HCI)

Search papers in conferences

• Pervasive Computing (PerCom)• Ubiquitous Computing (UbiComp)• Mobile data management (MDM)• Human Computer Interface (HCI)• …

• Publication in recent 3 years is more desirable

• Send me a couple of papers that you want to talk about– By next Monday (Sept. 9th)

Tentative list of topics (2/2)• Network security and privacy

candidates

• Network infra– BGP routing, DNS

• Bot– DDoS, Game

• Traffic analysis– IDS, IPS

• Web– Certificate, Passwd– Browser vulnerability– Phishing, pharming

• Network types– WLAN, Cellular,…

• Human factors• Anonymization• Location privacy• Data privacy• ID management• Censorship

security privacy

Search papers in conferences

• IEEE S & P• ACM CCS• ISOC NDSS• USENIX Security• PETS• ACSAC• …

evaluation

• 20%: 1st presentation

• 20%: 2nd presentation

• 10%: questions

– Send Q&A to TA by Mon. 9pm

• 40%: project

• 10%: attendance

– Two latenesses will be counted as one absence

• Upload your slides by Sunday 11:00pm

– penalty

administrivia• Classroom: 301-554

• Time: Mon. 5pm-

– No class on Wed.

• TA:– Jungmin Yoo

[email protected]• Office 301-518• phone 880-1832

• Slides and announcements

– http://mmlab.snu.ac.kr/courses/

– Id:

– Passwd:

Term project

• Each guy will work on her own project

• Paper of your presentation may be the reference

• A short meeting

• Propose a new idea that is expected to be better than the reference– Pros and cons

• A short meeting

• Finally, give a presentation on your project