Files attached
3 Your Title Here Forename Surname Student ID MSc in Cybersecurity National College of Ireland Abstract The abstract goes here. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Morbi rhoncus molestie magna ut consectetur. Suspendisse egestas ornare tortor vel ornare. Praesent tempus magna quis sem ullamcorper venenatis. Praesent feugiat auctor metus, nec suscipit erat faucibus quis. Nam efficitur auctor nisi, et ullamcorper nunc porta ac. Aenean ultrices mi at libero luctus, vel egestas mi sodales. Suspendisse elit odio, suscipit eget leo sed, sagittis sagittis justo. Vestibulum porttitor tincidunt tempor. Donec et diam eget ante mollis dignissim. Nam volutpat arcu sem, nec elementum augue porta ac. Nam rhoncus viverra mauris non ullamcorper. Integer nec neque ac arcu auctor ornare eget vitae leo. Table of Content I.Introduction1 II.Research Question2 III.Literature Review2 A.Research Niche2 IV.Research Methods & Specification2 V.Video Presentation2 VI.References3 Introduction This template provides authors with most of the formatting specifications needed for preparing electronic versions of their papers. All standard paper components have been specified for three reasons: (1) ease of use when formatting individual papers, (2) automatic compliance to electronic requirements that facilitate the concurrent or later production of electronic products, and (3) conformity of style throughout a conference proceedings. Margins, column widths, line spacing, and type styles are built-in; examples of the type styles are provided throughout this document and are identified in italic type, within parentheses, following the example. Some components, such as multi-levelled equations, graphics, and tables are not prescribed, although the various table text styles are provided. The formatter will need to create these components, incorporating the applicable criteria that follow. Figure 1: This is a caption. Research Question Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea. Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea. Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea. Kune et al. [2] ad quidam regione percipitur, Literature Review Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea [1]. Ea commodo aperiam complectitur pri, usu et case dolore. Kune et al. [2] ad quidam regione percipitur, est ut possit bonorum persecuti. Quis utinam o_endit eu usu, eu accumsan disputando per, id cibo reprehendunt sit [3, 4]. In melius legendos corrumpit pro. Research Niche Finish this subsection which contains a summary of all literature and an explanation of how your proposal is different as shown in Table 1. Col1 Characteristic 1 Characteristic 2 [1] Justo, vitae risus [1] Etur risus stu ed [2] stu ed risus [3, 4] stu ed risus [9] frozen risus Table 1: Summary of Literature Review and Research Niche Research Methods & Specification Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea [1]. Ea commodo aperiam complectitusdr asdfasdfasd asdfsdf pri, usu et case dolore. Kune et al. [2] ad quidam regione percipitur, est ut possit bonorum persecuti. Quis utinam asdfsdfad o_endit eu usu, eu accumsan disputando per, id cibo reprehendunt sit [3, 4]. In melius legendos corrumpit pro. posidonium Eos dico dignissim voluptatibus et, duo nisl cibo ut. Diceret periculis posidonium cum eu. [4] regione posidonium posidonium nam ex. Vix id viris phaedrum. Pri augue cetero probatus ut. Video Presentation Lorem ipsum dolor sit amet, ut veri deleniti eloquentiam sea [1]. Ea commodo aperiam complectitur pri, usu et case dolore. Kune et al. [2] ad quidam regione percipitur, est ut possit bonorum persecuti. Quis utinam o_endit eu usu, eu accumsan disputando per, id cibo reprehendunt sit [3, 4]. In melius legendos corrumpit pro. Eos dico dignissim voluptatibus et, duo nisl cibo ut. Diceret periculis posidonium cum eu. [4] regione nam ex. Vix id viris phaedrum. Pri augue cetero probatus ut. References [1] G. Feng and R. Buyya, “Maximum revenue-oriented resource allocation in cloud,” International Journal of Grid and Utility Computing, vol. 7, no. 1, pp. 12-21, 2016. [2] R. Kune, P. Konugurthi, A. Agawarl, R. R. Chillarige and R. Buyya, "The anatomy of big data computing," Software—Practice & Experience, vol. 46, no. 1, pp. 79-105, 2016. [3] A. Beloglazov and R. Buyya, "Openstack neat: A framework for dynamic and energy-efficient consolidation of virtual machines in openstack clouds," Concurrency and Computation: Practice and Experience, vol. 27, no. 5, pp. 1310-1333, 2015. [4] D. G. Gomes, R. N. Calheiros and R. Tolosana-Calasanz, "Introduction to the special issue on cloud computing: Recent developments and challenging issues," Computer & Electrical Engineering, vol. 42, pp. 31-32, 2015. Microsoft Word - H9RSC_RProp-description.docx Research in Computing Continuous Assessment 2 (MSCCYB1) Dr Babak Habibnia Administrative Data This second Continuous Assessment (CA) is worth 80% of the nal grade awarded. As published in the School portal, the deadline for submission of the assignment is: Wednesday 11 th August 2021 23:59hrs Extension/Re-run Should any student miss the assessment deadline with a valid reason, the student can apply for an extension/rerun using the Extension/Re-run Form online, via NCI360. N.B. All submissions will be electronically screened for evidence of academic misconduct (plagiarism and collusion). 1 Module Introduction It is expected that the knowledge and skills gained from the module will contribute to scholarship and to the generation of innovative solutions to intuitive research questions. Speci cally, the learning outcomes of this module are: LO1 Understand what constitutes a good research question. Propose a research question and identify its implications with regard to the choice of subject. LO2 Propose research objectives and identify possible deliverables. LO3 Create a literature review which situates the work with regard to state of the art and seminal work. Develop a research and development design and methodology. LO4 Critically assess and select methods for addressing the research question, including originality considerations. LO5 Show an awareness of the ethical issues that need to be addressed when conducting research. LO6 Understand the need for reproducibility as a minimum standard for assessing the validity of the results of research. LO7 Demonstrate an ability to write a comprehensive research plan that explores research methods and deliverables for a speci c subject in computing. 1 2 Assignment 2.1 Research Proposal This assignment must include the following components: Title Choose a title that encompasses the speci c topic within the area chosen. Abstract Renders a summary of your proposal and therefore should introduce the topic, state what was carried out, and outline the key points. It should be 150{200 words. References are not cited in an abstract. Contents Table Enables the reader to easily nd the information they require. It should be automat-ically generated by Microsoft Word or L A TEX. Introduction Should provide information on the background to the topic. This section must: • present the general context of your question within the sphere of Cybersecurity; • clearly identify the research question(s) and de ne the key terms; • motivate the purpose of the literature review | why is it important to research the chosen topic? • outline what the general ndings of the review are | this is where you can give the key element of your argument; and, • describe the structure of your document |- give the exact headings of each section and outline the key argument points you will be making in each section. This section should be 1-2 pages in length. Research Question Phrase your research question addressing the speci c topic and the measurable side. Explain why this question is worth investigating and how it will contribute to knowledge in the eld of research. Describe why the question is feasible (tools), clear (measurable), signi cant, and ethical. This section should be maximum 1 page in length. Literature Review Must compare, contrast and relate to previous work, en0umerate the objectives of the previous work and specify their foreseen contributions. This section must: • introduce each previous work by outlining the key argument points that you will be covering; • nish each subsection with a brief conclusion of what have been covered in the previous work and then link to the next subsection by outlining what you will be discussing next; • present a logical order of the reviewed previous works; • critically contrast at least two previous works in each paragraph, as opposed to just ‘reciting’ what the previous work say. Every paragraph should explain the signi cance of the previous works are in the context of your own research question; • ensure there is consistent referral back to the research question {{ do not be afraid to consist- ently remind the reader why a point is relevant in the context of your own question; and, • Make sure the previous works are properly cited. Overall the literature survey should not consist of a series of paragraphs beginning, ‘Jones/Smith argues....’. Focus upon concepts, issues, cases, with reference to authors, and then critically contrast them, clearly highlighting advantages and shortcomings. The literature review must nish identifying the research niche and the expected contribution of the research. This section should be between 4-6 pages in length and contain some 20 references, mostly using recent academic articles from reputable journals (JCR Impact Factors) and/or conferences (Aus- tralian CORE ranking: http://portal.core.edu.au/conf-ranks/). The complete list of computing databases and journals is available from the NCI Library at: https://www.ncirl.ie/Library/ NCI- Library/. Continuous Assessment 2, Research in Computing. Page 2 Please include