Our papers are 100% unique and written following academic standards and provided requirements. Get perfect grades by consistently using our writing services. Place your order and get a quality paper today. Rely on us and be on schedule! With our help, you'll never have to worry about deadlines again. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
The first step consists of choosing a subject (any subject related to the information security field), introducing it in the introduction section (from general domain to specific field), and starting your literature review (existing researches already done on the subject chosen) by describing these researches briefly (at least 4 references). Do not forget to insert the references in your document.
You need to prepare a word document including all information gathered (included directly in your report, 3 – 4 pages) and prepare slides to present progress (8 – 10 slides). A non-exhaustive list of subjects is the following:
- Improvement of security in IoT and mobile apps
- software security testing
- software vulnerabilities analysis
- software security evaluation methods
- software security metrics and benchmarking
- software security requirements modeling
- Enhancement of security in Electronic Currency Payment
- Forensics Analysis of snapchat and similar applications
- Ransomware
- readiness of organizations
- reverse engineering of some real ranswomware
- Trust based system Management in Routing protocol in WSNs.
- Software Defined Networking (SDN) vulnerabilities.
- Cryptographic techniques under cloud systems
- Encryption in Real-time/IP Telephony (VoIP)
- Security issues in Wireless Body Network (WBN)
- Integrated Threat Modelling: How to model Threats?
- End-To-End Verifiability in Electronic Elections
- Study the applicability of electronic voting systems such as helios
- How information from honeypots can be used to improve network security.
- Design and Implementation of 3D Localization System. In the world of Internet of Things accurate indoor and outdoor localization of people and assets is not just desirable, but an imperative feature for a number of security- and safety-critical systems. In this project, we will explore the limits of accurate and secure 3D localization using an in-house purpose-built sensor module with an Ultra-Wide Band (UWB) chipset and several sensors (e.g., Accelerometer, Gyroscope). The project goal is to build a complete 3D localization system based on state-of-art time-of-flight ranging UWB aided by sensor fusion, deploy it in scalable real-life scenarios and study the behavior. Both infrastructure-based and infrastructure-free approaches will be explored. Upon exceptional successful completion of the project, preparation for participating in the Microsoft Indoor Localization Competition 2016 will be considered.
- Malicious Infrastructure Analysis:
- Malicious networks are increasingly abusing Internet infrastructure to perform illicit activities. Recent studies indicate that botnets are the primary platform through which cyber criminals create global cooperative networks that are instrumental in most cyber criminal attacks. Dynamic malware analysis provides valuable insight into such malicious activities and helps security experts detect and protect against many cyber attacks.
- Objectives: Deriving cyber threat intelligence from dynamic malware analysis to reveal more insights about different cyber attacks.
- Expected Results: Reveal malicious networks with their characteristics.
- Cyber Threat Intelligence Framework
- There are many security tools with different objectives which need to be aggregated in one framework to provide the complete picture security threats.
- (https://github.com/hslatman/awesome-threat-intelligence)
- Objectives: Integrate different open source tools in an intelligent framework
- Expected Results: The framework need to generate insightful information about different security threats. Real dataset (malicious) can be used to test the framework.

We offer the best essay writing services to students who value great quality at a fair price. Let us exceed your expectations if you need help with this or a different assignment. Get your paper completed by a writing expert today. Nice to meet you! Want 15% OFF your first order? Use Promo Code: FIRST15. Place your order in a few easy steps. It will take you less than 5 minutes. Click one of the buttons below.
Order a Similar Paper Order a Different Paper