Network security and privacy
|
|
- Donald Horn
- 6 years ago
- Views:
Transcription
1 Winter semester 2011/2012 Seminar on Network security and privacy (selected topics) Prof. Dr. Dieter Hogrefe Youssef Shehadeh Maimun Rizal
2 Course Overview Prerequisites (Recommended): Mobile communication I Mobile communication II Implements Module: M.inf Seminar Telematik I M.Inf Seminar Telematik II Advanced Topics in Computer Networking I (ITIS) Language English 2
3 Course Objectives Primary objectives: Learn some fundamentals of security and privacy issues in computer and wireless networks. Form the state of art on a certain topic. Provide a paper form report and a professional presentation for a chosen topic. Secondary objectives: Learn how to search for papers: IEEExplore, ACM, Citeseerx, whitepapers. Experience in preparing professional reports and presentations. 3
4 Hints on Reading papers PAPER Start QUICK SCAN Title, Abstract, Subtitles, Figures, Conclusion, READING Is the paper interesting? No Yes Thorough Reading Read carefully paper, discuss, analyze results. Summarize paper contributions, possible enhancements? End 4
5 Report Requirements: In form of IEEE conference template paper [two columns, 5-8 pages]: shing/templates.html Organization: Abstract, Introduction (Related work) Main part of your topic (model, discussion, analysis, simulations, results...) Conclusion PDF + Editable(Latex, word...) format 5
6 Hints on Writing Scientific Papers Abstract: not more than words. Brief Introduction*: Introduce problem (why important, motivate) (Related work). Outline your contribution. Outline paper structure.(this paper is organized as follows...) Body*: Problem, system model/architecture, basics... Discussion, anaylsis. Evaluation, results. Summary and conclusions. Bibliography. *These points might vary with the subject topic. *Source: 6
7 Hints on Writing Scientific Papers Paragraphs should have a logical narrow flow. Avoid very long sentences. Clarify notations at first use. Write for the reader, not yourself. Not only show figures! Comment, Analyze and Abstract! Avoid spelling mistakes!!! Review several times! 7
8 Presentation High-quality presentation Well-structured, correct spelling, professional layout. Duration of each presentation ~30 minutes + ~10 minutes discussion. Slides presentation (e.g. Pdf, ppt, ) Compliance with set deadlines. 8
9 Hints for the Presentation Rule of thumb: A slide containing a normal content takes about 1-2 minutes for 30 minutes approximately slides. Basic guide Welcome your audience. Try to speak without notes, do not read out loud everything from the slides word-by-word. Adjust your presentation speed so that the audience can follow. How to give a good research talk guide: 9
10 Selected Topics 1. Wireless Fingerprinting: identifying devices through physical layer characteristics 2. DOS Attacks against IEEE Privacy Preservation in WSNs 4. Protecting Privacy in Participatory Sensing Systems 5. Security and Privacy in Vehicular Communication Systems 6. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications 7. Border Gateway Protocol (BGP) Security 8. Voice over IP Security 9. Man-in-the-Middle Attacks on VoIP 10. Authentication in Voice over Internet Protocol (VoIP) 10
11 References L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, ''Identifying unique devices through wireless fingerprinting,'' In Proc. of WiSec, March/April L. Wang, B. Srinivasan and N. Bhattacharjee, ''Security Analysis and Improvements on WLANs,'' JOURNAL OF NETWORKS, VOL. 6, NO. 3, MARCH 2011 N. Li, N. Zhang, S. Das, and B. Thuraisingham, ''Privacy preservation in wireless sensor networks: A state-of-the-art survey,'' Journal on Ad Hoc Networks 7 (2009) K. Huang, S. Kanhere, and W. Hu, ''Preserving privacy in participatory sensing systems,'' Journal on Computer communications 33 (2010), pp P. Papadimitratos, et al., ''Secure Vehicular Communication Systems: Design and Architecture,'' IEEE Communications Magazine, November 2008, pp M. Al Ameen, J. Liu, and K. Kwak, ''Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications,'' Journal of Medical Systems, 1 9. DOI /s K. Butler, T. Farley, P. Mcdaniel, and J. Rexford, ''A Survey of BGP Security Issues and Solutions,'' IEEE/ACM Trans. Netw., vol. 98, no. 1, pp , Jan A. Keromytis, ''A Comprehensive Survey of Voice over IP Security Research,'' IEEE Commun. Surveys Tutorials, vol. PP, no. 99, pp. 1 24, R. Zhang, X. Wang, R. Farley, X. Jiang,''On the Feasibility of Launching the Man-in-the-Middle Attacks on VoIP from remote Attackers'', ASLACCS09, March 10-12, 2009, Sydney, NSW, Australia. ACM /09/03. F. Wang, Y. Zhang, ''A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography,'' Computer Communications, Volume 31, Issue 10, 25 June 2008, Pages , ISSN
12 Course Plan 12
13 Grading points Report: 50% Presentation: 40% Active participation in seminar: 10%. Penalties may apply: Incompliance with set deadlines. Incomplete attendance of block seminar. 13
14 14
Pre-Course Meeting Proseminar Network Hacking & Defense
Network Architectures and Services Department Computer Science Technische Universität München Pre-Course Meeting Proseminar Network Hacking & Defense Dr. Holger Kinkelin and Nadine Herold Content q Administrative
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationSeminar Optimizing data management on new hardware (OpDaMNeHa)
Seminar Optimizing data management on new hardware (OpDaMNeHa) Summer Term 2014 Lehrgebiet Informationssysteme Weiping Qu qu@cs.uni-kl.de AG Datenbanken und Informationssysteme AG Heterogene Informationssysteme
More informationImplementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105
More informationWeb Engineering. VSR://EDU/Seminar. Prof. Dr.-Ing. Martin Gaedke Sebastian Heil, M. Sc. VSR.Informatik.TU-Chemnitz.de
VSR://EDU/Seminar Web Engineering ////// Summer semester 2016 /////// Prof. Dr.-Ing. Martin Gaedke Sebastian Heil, M. Sc. VSR.Informatik.TU-Chemnitz.de 14.04.2016 Chemnitz University of Technology Prof.
More informationXRM2018 Paper Preparation and Submission Guide
XRM2018 Paper Preparation and Submission Guide Welcome to the XRM2018 Meeting paper website. XRM2018 paper submission is entirely electronic; do not mail hard-copy printouts. All papers, whether invited
More informationESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS
ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer
More informationSolution Manual William Stallings Network Security
Solution Manual William Stallings Network Security Computer security william stallings solution - SOLUTION MANUAL WILLIAM STALLINGS NETWORK SECURITY SOLUTION MANUAL WILLIAM STALLINGS NETWORK SECURITY Did
More informationCPSC 4600 Biometrics and Cryptography Fall 2013, Section 0
CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li
More informationA Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy
More informationPRACTICE EXERCISES. Student Success SCRATCH
PRACTICE EXERCISES Student Success FROM SCRATCH The slide show you create in this practice exercise covers concepts and skills that will help you be successful in college. You create a title slide, an
More informationITSE 1294 Special Topics in CS: Information Technology in Health Care (2:1-2)
ITSE 1294 Special Topics in CS: Information Technology in Health Care (2:1-2) Informal Description: The medical environment in now highly computerized. This course introduces students to computers, and
More informationPhiladelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus
Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008 Course Syllabus Course Title: Advanced Databases Course Level: 4 Lecture Time: Course code:
More informationSecuring BGP Networks using Consistent Check Algorithm
Securing BGP Networks using Consistent Check Algorithm C. K. Man, K.Y. Wong, and K. H. Yeung Abstract The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure.
More informationECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology)
ECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology) Spring 2010 Paul I-Hai Lin, Professor of Electrical and Computer Engineering Technology Indiana University-Purdue
More information2. Course prerequisites, corequisites, and where the course fits in the program of study
1. Course title/number, number of credit hours Cloud Computing/COT5612 # of credit hours 3 2. Course prerequisites, corequisites, and where the course fits in the program of study Basic knowledge of UML
More informationPDA Trainer Certification Process V 1.0
PDA Trainer Certification Process V 1.0 ~ 1 ~ Index Introduction to the Certification Process... 3 Certification Process Steps... 4 Description of the Certification Process Steps... 5 A - PDA Trainer Profile...
More informationAuthor Submission Guidelines
Author Submission Guidelines UPDATED: WINTER 2019 Contents 1. Overview... 3 1.1 Important Conference Dates... 3 1.2 Summary Checklist... 4 1.3 Required Paper Attributes... 4 1.4 Paper Submission System...
More informationPowerPoint Basics. Getting Started
PowerPoint Basics Getting Started 1. Open up PowerPoint. 2. The following window will appear. 3. Select Template. 4. Click the OK button. 5. A new window appears. Click on the Presentation Design tab to
More informationCryptanalysis of a Markov Chain Based User Authentication Scheme
Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com
More information42 Computing in Science & Engineering 43 Concurrency, IEEE 44 Consumer Electronics Magazine, IEEE 45 Consumer Electronics, IEEE Transactions on 46
IEEE Journals List 1 Advanced Packaging, IEEE Transactions on 2 Aerospace and Electronic Systems Magazine, IEEE 3 Aerospace and Electronic Systems, IEEE Transactions on 4 Affective Computing, IEEE Transactions
More informationECE 4450:427/527 - Computer Networks
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Lecture 1: Introduction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks 1 / 16 Outline 1 Information 2 Broad Overview
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY
More information@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India
Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.
More informationWeb Design: Business Site Project
Web Design: Business Site Project Purpose: You will be developing a large business site. The purpose of this website is to demonstrate your knowledge of web design elements. Directions: You will have benchmark
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationIJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby
Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address
More informationBS375 AUDITING. This sample unit outline is provided by CHC for prospective and current students to assist with unit selection.
BS375 AUDITING This sample unit outline is provided by CHC for prospective and current students to assist with unit selection. Elements of this outline which may change with subsequent offerings of the
More informationSeminar Recent Trends in Database Research
Seminar Recent Trends in Database Research Summer Term 2013 Lehrgebiet Informationssysteme Weiping Qu qu@cs.uni-kl.de AG Datenbanken und Informationssysteme AG Heterogene Informationssysteme Goals a) Familiarize
More informationSTUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY
STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY This study guide informs you about the rules and policies for the Master s program in Economic Policy. It is based on the official examination regulations
More informationIntroduction to PowerPoint 2013
Viewing a Presentation Introduction to PowerPoint 2013 When you create a Blank Presentation in PowerPoint, the workspace opens in Normal view. Normal view is divided into three areas: 1. Slide Pane - shows
More informationTree Structure and Algorithms for Physical Design
Tree Structure and Algorithms for Physical Design Chung Kuan Cheng, Ronald Graham, Ilgweon Kang, Dongwon Park and Xinyuan Wang CSE and ECE Departments UC San Diego Outline: Introduction Ancestor Trees
More informationEducation. Professional Experience. Awards and Honors
Education Wade Trappe Department of Electrical and Computer Engineering, and Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Road, Piscataway, NJ 08854
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationWritten Communication
Module 2: Written Communication 1 Your Passport to Professionalism: Module 2 Written Communication Step 1 Learn Introduction Sooner or later, you will need to communicate in writing. You will write down
More informationCerticate programs in English Language
Module Guide Certicate programs in English Language Summer Term 2018 Based on Rev. 156. Last change 16.11.2017 at 12:55 from kwunderlich. Generated on 16.11.2017 at 13:55. Contents 1 Introduction to RF
More informationAnalysis and Implementation Wireless Sensor Network of Information Technology Systems
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 3 (March 2017), PP.69-73 Analysis and Implementation Wireless Sensor Network
More informationS. Indirakumari, A. Thilagavathy
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme
More informationThe General Analysis of Proactive Protocols DSDV, FSR and WRP
Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.
More informationUniversity of Bonn. Faculty of Agriculture ARTS. Agricultural Sciences and Resource Management in the Tropics and Subtropics.
University of Bonn ARTS Secretariat Nussallee 1 53115 Bonn Germany University of Bonn Faculty of Agriculture ARTS Agricultural Sciences and Resource Management in the Tropics and Subtropics Application
More informationHOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING
HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING Gagandeep Kaur, Dr. Gagandeep Abstract Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative
More informationCONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS. SYLLABUS Winter 2018
1 of 5 CONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS SYLLABUS Winter 2018 GENERAL INFORMATION Spectroscopy and Structure of Organic
More informationIP MULTIMEDIA SUBSYSTEM (IMS) SECURITY MODEL
International Journal of Advance Research, IJOAR.org ISSN 2320-9194 1 International Journal of Advance Research, IJOAR.org Volume 1, Issue 3, March 2013, Online: ISSN 2320-9194 IP MULTIMEDIA SUBSYSTEM
More informationWelcome to Part 5 of the slide show.
Welcome to Part 5 of the slide show. Part 5:Finding Articles using GALILEO. Go to the homepage at http://www.galileo.usg.edu Google vs. GALILEO A search in Google gave 10,400,000 results on water purification
More informationAustralian Standard. Records Management. Part 1: General AS ISO ISO
AS ISO 15489.1 2002 ISO 15489-1 AS ISO 15489.1 Australian Standard Records Management Part 1: General [ISO title: Information and documentation Records management Part 1: General] This Australian Standard
More informationCOOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH
More informationHow To Write Maintainable Engineering Specifications. Forrest Warthman
1 How To Write Maintainable Engineering Specifications Forrest Warthman 2 Outline Motivations and audience Editing and vector-graphics tools Document formats and templates Inserting figures and tables
More informationThis course contains the subject matter to prepare candidates for the ivanti Certified Service Desk 2017 Administrator exam.
Course Overview The Service Desk Administration 2017 course is a five-day training course covering topics for both administrative and design functions within the Service Desk 2017. Students will learn
More informationCLICK (Complete Learning In Computer Knowledge)
CLICK (Complete Learning In Computer Knowledge) Microsoft Office 2016 Level 2 Course Overview: The CLICK Level 2 course is intended for students who want to learn the advanced tools and features of Windows
More informationPhD Candidacy Exam Overview
EDIC - Doctoral Program in Computer & Communication Sciences PhD Candidacy Exam Overview https://phd.epfl.ch/edic/candidacyexams Candidacy exam background The philosophy After your 1 st year of PhD you
More informationA S ISO Records Management Part 1: General
AS ISO 15489.1 2002 ISO 15489-1 AS ISO 15489.1 Australian Standard Records Management Part 1: General [ISO title: Information and documentation Records management Part 1: General] This Australian Standard
More informationNetiquette: Composing
Netiquette: Composing Email Critical Learning Summarizing information from multiple internet sources Understand email: my attitudes, advantages and disadvantages, comparison to memos, guidelines for writing
More informationChallenges in Mobile Ad Hoc Network
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.
More informationClone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC)
Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC) Submitted By Ms. Rupika Yadav M Tech III Sem Co-guide Prof Vishal Tiwari Dept. of CSE Guide
More informationMODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS
Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and
More informationAdobe Connect Webinar Software Host
Adobe Connect Webinar Software Host This document is designed to cover the basic steps involved in setting up and hosting a meeting using Adobe Connect. Creating a New Meeting In order to create a new
More informationThe Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs
I J C T A, 9(41), 2016, pp. 157-164 International Science Press ISSN: 0974-5572 The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs Makul Mahajan 1 and Mritunjay Kumar
More informationBusiness Computer Applications (BCIS 1305) Online. Credit: 3 semester credit hours (3 hours lecture)
1 Business Computer Applications (BCIS 1305) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online
More informationInformation and documentation Records management. Part 1: Concepts and principles AS ISO :2017 ISO :2016
ISO 15489-1:2016 AS ISO 15489.1:2017 Information and documentation Records management Part 1: Concepts and principles This Australian Standard was prepared by Committee IT-021, Records and Document Management
More informationEnergy and Memory Efficient Clone Detection in Wireless Sensor Networks
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Chennai) 1 Vladymir.F, 2 J.Sivanesa Selvan, 3 Mr.Prabhu.D 1 (Information Technology, Loyola Institute of Technology, Chennai) ( Email:
More informationDigital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model
Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist
More informationSecurity Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues
Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication
More informationWhat are the elements of website design?
Contents What is a website?...1 Why does design matter?...1 What are the elements of website design?...1 What guidelines can help direct the design?...2 What physical objects are most similar to a web
More informationAdvisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431
Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:
More informationFORMAT & TYPING GUIDE
FORMAT & TYPING GUIDE for CEATI Reports updated March 2018 Timeline of a Report Pre-Writing As you sit down to write the report, ensure you begin by downloading the most recent CEATI template at www.ceati.com/rfps.
More informationWriting Reports with Report Designer and SSRS 2014 Level 1
Writing Reports with Report Designer and SSRS 2014 Level 1 Duration- 2days About this course In this 2-day course, students are introduced to the foundations of report writing with Microsoft SQL Server
More informationWeb WRITING
Web WRITING BASICS 800-556-3009 www.careertrack.com DISCLAIMER: The principles and suggestions in this handout and the WEB WRITING BASICS webinar are presented to apply to diverse personal and company
More informationITSM Training for Field Service
itsm@harvard.edu May 2013 ITSM Training for Field Service Incident & Request Management with ServiceNow (ServiceNow Training for Field Service Version 1) Agenda Introduction Identifying & Logging Categorizing
More informationThe PCC CIS etutorial to PowerPoint
The PCC CIS etutorial to PowerPoint Table of Contents What happens when I start PowerPoint?...4 Setting Up Your Toolbars... 5 Expanding Your Menus... 6 How do I start creating a new presentation?...6 Design
More informationIEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014
IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 DLT Planning This was my first DLT (Distinguished Lecture
More informationWriting for the Web. Nonprofit 911 Teleconference June 16, 209. Farra Trompeter Dan Gunderman
Writing for the Web www.bigducknyc.com Nonprofit 911 Teleconference June 16, 209 Farra Trompeter Dan Gunderman Overview What s different Principles of Web text Guidelines Resources Appendix What s different?
More informationUsing PowerPoint - 1
Using PowerPoint - 1 Introduction to the course. Before we start, we need to know what power point is. I m sure most of you know about ppt, but for those of you who may be new to this: [1a-c] When you
More informationRadnor Middle School Course Syllabus. Fill in course name: Technology Education Computers Put in course number (4 digits):
Radnor Middle School Course Syllabus Created November 5, 2013: Gail Furman Fill in course name: Technology Education Computers Put in course number (4 digits): Credits: Grades: 8 Weighted: Prerequisite:
More informationCUE-10: Moderation Page 1. Comparative Usability Evaluation 10. Moderation. Observing usability test moderators
CUE-10: Moderation Page 1 Comparative Usability Evaluation 10 Moderation Observing usability test moderators Workshop: Boston, MA, USA, Wednesday 9 May 2018 CUE-10: Moderation Page 2 Call For Participation
More informationA Hierarchical Document Clustering Approach with Frequent Itemsets
A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of
More informationSecurity Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards
Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,
More informationA Review Paper on Voice over Internet Protocol (VoIP)
A Review Paper on Voice over Internet Protocol (VoIP) Aastha Tiwari* Research Scholar, M.tech. 2 nd Computer Networks 1 Bhilai Institute of Technology, Durg, Chattisgarh, India tiwariaastha17@gmail.com
More informationKen Agress, Senior Consultant PlanNet Consulting, LLC.
Elements of a Vulnerability Assessment Ken Agress, Senior Consultant PlanNet Consulting, LLC. Defining a Vulnerability Assessment Agenda Types of Vulnerability Assessments Are You Ready for an Assessment?
More informationHello, welcome to this brief tutorial on accessing and playing Adobe Presenter video files.
Hello, welcome to this brief tutorial on accessing and playing Adobe Presenter video files. Recorded video presentations for this course were produced using Adobe Presenter. After viewing this brief tutorial,
More informationCreating Great Visual Aids
Creating Great Visual Aids How to create and use visual aids well! l Keep it simple, Stern! l Use message titles l Ensure readability l Be consistent l Think visually Follow design guidelines 1. Keep it
More informationhttps://asd-pa.perfplusk12.com/admin/admin_curric_maps_display.asp...
1 of 8 8/27/2014 2:10 PM Units: Teacher: KeyboardingMOWord/Powerpoint, CORE Course: KeyboardingMOWord/Powerpoint Year: 2012-13 Skill Builder Content Skills What is good technique? What are proofreader
More informationCryptanalysis on Two Certificateless Signature Schemes
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 4, pp. 586-591 Cryptanalysis on Two Certificateless Signature Schemes F. Zhang, S. Li, S. Miao, Y. Mu,
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large
More informationA Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu
A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation
More informationA METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication
More informationMetal Recovery from Low Grade Ores and Wastes Plus
Metal Recovery from Low Grade Ores and Wastes Plus D7.1 Project and public website Public Authors: Marta Macias, Carlos Leyva (IDENER) D7.1 I Page 2 Deliverable Number 7.1 Deliverable Name Project and
More informationINF 315E Introduction to Databases School of Information Fall 2015
INF 315E Introduction to Databases School of Information Fall 2015 Class Hours: Tuesday & Thursday10:30 am-12:00 pm Instructor: Eunyoung Moon Email: eymoon@utexas.edu Course Description Almost every website
More informationepath - Participant s User Guide
Participant s Users Guide Last Updated: 05/18/2012 From the Office of Instructional Technology and Learning Services Page 1 of 32 Table of Contents Look for the blue dots for the new content that s been
More informationMicrosoft PowerPoint level 1 course content (1-day)
http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft PowerPoint level 1 course content (1-day) Course Description Microsoft Office PowerPoint Beginners course
More informationB.A. in Information Systems
General Elective 1 Term Credits 15 B.A. in Information Systems 1 B.A. in Information Systems (120 credits minimum) Course Title Credits First Year CS 100 Roadmap to Computing HUM 101 English Composition:
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationPowerPoint TM Tutorial
PowerPoint TM Tutorial PowerPoint TM is an exciting tool that assists in effectively presenting a summation of important ideas to an audience. PowerPoint TM can often be intimidating to one who has never
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB
ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document
More informationVisual Identity Standards
Visual Identity Standards 12.0 Presentations Information and inquiries: University Relations brand@ucalgary.ca Visual Identity Standards 2 12.0 Presentations 12.01 Introduction 12.01 Introduction 12.02
More informationChapter 22: Communication Process Study Guide Matching
Chapter 22: Communication Process Study Guide Matching Match the following terms with their definitions. A. barrier B. channel C. decoding D. empathy E. encoding F. feedback G. four Cs of writing H. memo
More informationInstitute of Economic Sciences, Belgrade, Serbia Manual
Institute of Economic Sciences, Belgrade, Serbia Manual User Registration and Submission of Articles to the Journal of Women's Entrepreneurship and Education Editorial Board of the Journal of Women s Entrepreneurship
More informationPowerPoint 2016 Basics for Mac
1 PowerPoint 2016 Basics for Mac PowerPoint 2016 Basics for Mac Training Objective To learn the tools and features to get started using PowerPoint more efficiently and effectively. What you can expect
More informationApplication Manual for International Baccalaureate Applications
Application Manual for International Baccalaureate Applications How to get started? Go to the main UWC Belgium IB application page The main access page to apply for an International Baccalaureate with
More information