53941 – Week 2Literature Review – Broad Scan and Reading TemplateFollowing

SOLVED BY  Expert Writers

Week 2
Literature Review – Broad Scan and Reading Template
Following template is only to complete broad scan and reading. Decide on a research topic and follow the steps below to fill in the sections of this document. Once complete you may use it as your assignment section 2, Literature Review – Broad Scan and Reading part.
Title of the project (A tentative title of selected research)
Name, Student ID

Literature Review – Broad Scan and Reading (minimum 3 rounds as follows)
Round 1
What research interests lead you to the choice of initial keywords?
Example search phrase:
I am interested in cyber security and how it is applied in community policy. I would think that “community policy” and “cyber hygiene” as the keywords but returned no results. I changed to community policy and cyber security.
– Keywords, source/research database, number of results returned
Example:
Keywords: community policy cyber security
Database: IEEE Explorer
Number of results: 40
– Result (first 20+, with NO detailed abstracts)
Title, author, year, journal/conference title. Highlight the articles selected for detailed/focused reading.
Example search results:
Document Title Authors Publication Title Year
1. Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review R. Ramirez; N. Choucri IEEE Access 2016
2. A Dutch Approach to Cybersecurity through Participation K. Clark; D. Stikvoort; E. Stofbergen; E. van den Heuvel IEEE Security & Privacy 2014
3. Developing an international cooperation on cyber defense and deterrence against Cyber terrorism M. Dogrul; A. Aslan; E. Celik 2011 3rd International Conference on Cyber Conflict 2011
4. Designing a Formal Model Facilitating Collaborative Information Sharing for Community Cyber Security W. Zhao; G. White 2014 47th Hawaii International Conference on System Sciences 2014
5. State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia S. Cheang; S. Sang 2009 International Conference on Availability, Reliability and Security 2009
6. Unmanned aerial vehicle smart device ground control station cyber security threat model K. Mansfield; T. Eveleigh; T. H. Holzer; S. Sarkani 2013 IEEE International Conference on Technologies for Homeland Security (HST) 2013
7. A Computer Science course in Cyber Security and Forensics for a multidisciplinary audience W. A. Lawrence-Fowler 2013 IEEE Frontiers in Education Conference (FIE) 2013
8. A security model for complex applications based on normative multi-agents system H. Cheribi; M. K. Kholladi 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) 2015
9. Pressing pause: A new approach for international cybersecurity norm development C. Sabbah 2018 10th International Conference on Cyber Conflict (CyCon) 2018
10. Cyber?€?Physical Security of a Smart Grid Infrastructure Y. Mo; T. H. Kim; K. Brancik; D. Dickinson; H. Lee; A. Perrig; B. Sinopoli Proceedings of the IEEE 2012
11. A framework for risk-aware role based access control K. Z. Bijon; R. Krishnan; R. Sandhu 2013 IEEE Conference on Communications and Network Security (CNS) 2013
12. Security investment under cognitive constraints: A Gestalt Nash equilibrium approach J. Chen; Q. Zhu 2018 52nd Annual Conference on Information Sciences and Systems (CISS) 2018
13. ?€?Attack?€? as a term of art in international law: The cyber operations context M. N. Schmitt 2012 4th International Conference on Cyber Conflict (CYCON 2012) 2012
14. Optimal Attack Energy Allocation against Remote State Estimation L. Peng; L. Shi; X. Cao; C. Sun IEEE Transactions on Automatic Control 2018
15. Protecting privacy, civil rights and civil liberties using data labeling and segmentation T. R. Schmoyer; B. Doyle; M. Dufel; K. Higa-Smith 2015 IEEE International Symposium on Technologies for Homeland Security (HST) 2015
16. Sovereignty in cyberspace: Balkanization or democratization A. Cattaruzza; D. Danet; S. Taillat; A. Laudrain 2016 International Conference on Cyber Conflict (CyCon U.S.) 2016
17. Scaling graph community detection on the Tilera many-core architecture D. Chavarria-Miranda; M. Halappanavar; A. Kalyanaraman 2014 21st International Conference on High Performance Computing (HiPC) 2014
18. Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet S. Wendzel; B. Kahler; T. Rist 2012 IEEE International Conference on Green Computing and Communications 2012
19. The Public as Partner? Technology Can Make Us Auxiliaries as Well as Vigilantes G. T. Marx IEEE Security & Privacy 2013
20 Context-based access control model for smart space A. Smirnov; A. Kashevnik; N. Shilov; N. Teslya 2013 5th International Conference on Cyber Conflict (CYCON 2013) 2013
– Review & Summary (a paragraph of 6-10 lines)
Example:
1) What was your opinion after going through the list? What consideration led to the new set of keywords?
My views: Many articles about cyber security, but not apparently related to community except for two articles. So new keywords shall quote community and security.
2) New Keywords derived , based on the review of the search result, to be used in the next round of search
New keywords derived: “community cyber security”
3) Provide details of the articles/work identified-Title, author, year, journal/conference title, abstract
These are the most relevant articles you find in round 1 search result list. Read these articles under focused reading. Presentdetails of the articles in table format.
20. Designing a Formal Model Facilitating Collaborative Information Sharing for Community Cyber Security W. Zhao; G. White 2014 47th Hawaii International Conference on System Sciences 2014
Communities are becoming more vulnerable to cyber attacks as their reliance on critical cyber infrastructures is growing. Due to the interdependency among different cyber infrastructures, collaborative information sharing is necessary and important to help a community detect potential risks, prevent cyber attacks at an early stage, and facilitate incident response as well as preparedness activities in communities. In this paper we propose a group-centric collaborative information sharing framework that aims to improve community cyber security. By analyzing specific information sharing requirements in the community, we design a formal policy model for this framework. Our model is illustrated by several information sharing scenarios in the community.
21. State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia S. Cheang; S. Sang 2009 International Conference on Availability, Reliability and Security 2009
This paper presents background information and the progress of the government effort on Cyber Security in Cambodia. Firstly, this study establishes a framework to assess the current effort of Cambodian government on cyber security. Secondly, the results of the assessment are used to develop policy implications, serving as a roadmap to secure a national online community. Furthermore, this paper discusses the process to establish a management and technical incident response capability of the national Computer Emergency Response Team to contain on-going cyber incidents.
– Appendix (need to be conducted in round 1 broad scan but to be included at the end of the document, not here) including first 20+ returned search including detailed abstracts
Title, author, year, journal/conference title, abstract
Round 2
– List keywords, derivedin round 1, source/research database, number of results returned
o Keywords: “community cyber security”
o Database: IEEE Explorer
o Number of results: 9
– List out result: Up to 20search results list, presented in table formatwith no detailed abstracts
Title, author, year, journal/conference title
– Review & Summary (a paragraph of 6-10 lines)
What was your opinion after going through the list, what consideration led to the new set of keywords?
– List out the new keywords derived.
– Detail reading article/work identified-Title, author, year, journal/conference title, abstract
These are the most relevant articles you find in round 2 search result list. Read these articles under focused reading. Presentdetails of the articles in table format.
– Appendix (need to be conducted in round 2 broad scan but to be included at the end of the document, not here) including first 20+ returned search including detailed abstracts
Title, author, year, journal/conference title, abstract
Round 3
– Keywords, come from round 2, source/research database, number of results returned
– List out result: Up to 20search results list, presented in table formatwith no detailed abstracts
Title, author, year, journal/conference title
– Review & Summary(a paragraph of 6-10 lines)
What was your opinion after going through the search results list?
What consideration led to the new set of keywords?
– List out the new keywords derived.
– Provide details of the articles/work identified-Title, author, year, journal/conference title, abstract
These are the most relevant articles you find in round 3 search result list. Read these articles under focused reading. Presentdetails of the articles in table format.
– Appendix (need to be conducted in round 3 broad scan but to be included at the end of the document, not here) including first 20+ returned search including detailed abstracts
– Title, author, year, journal/conference title, abstract
Appendix
A1. Round 1 Broad Scan, keyword, source/research database, number of results returned
20+ Title, author, year, journal/conference title
With abstract
Example outcomes:
Keywords: community policy cyber security
Database: IEEE Explorer
Number of results: 40

A2. Round 2 Broad Scan, keyword, source/research database, number of results returned
Up to 20 results, Title, author, year, journal/conference title
With abstract
A3. Round 3 Broad Scan, keyword, source/research database, number of results returned
Up to 20r,esults Title, author, year, journal/conference title
With abstract

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER