Description
we need a project in Intrusion Detection including :
1- from the following references and more
2- following the attached templet
3- making a presentation with talking points ( power point )
4- un plagiarized with full citation report with max percentage of plagiarism 25%
5- APA style
6- following the project description
as the following abstract ,,
Due to the rising difficulty of the cyber security vulnerabilities and network security demands a crucial countermeasure in the domain of intrusion detection systems (IDS), specifically in the shared domain like IoT and vehicular networks.
The following proposals expand the implementation of a federated learning (FL) and multi-criteria decision analysis (MCDA) to finally achieve an improved accuracy in the IDS.
federated learning features provide an effective unified learning to the un-centralized structure to enable devices to enhance the detection algorithm concurrently to ensure the confidentiality of the data by limiting the availability [1].
Such mechanisms are critical to IoT applications, when crucial data must be protected.
MCDA also brings systematic structure to measure and choose the most proper features in machine learning-based IDS, to eventually reach an enhanced, adaptive, accurate detection [2].
By joining these approaches, the suggested structure target is to make a resistant, effective IDS able to rapidly Adjust with the rapidly improving vulnerabilities in various networks domains [3].
References:
, Yousuf, R., Sharma, N., & Another Author. (2025). Federated ensembled learning for intrusion detection using IoT network. In Proceedings of the 12th International Conference on Emerging Trends in Engineering & Technology – Signal and Information Processing (ICETET – SIP) (pp. 1-5). IEEE Xplore Digital Library.
, & Sakr, Z. (2025). Application of multi-criteria decision analysis for quantifying responsibility in ML-based intrusion detection systems. Neutrosophic Systems with Applications, 25(8), 769-801.
, Ma, Y., Bai, J., & Additional Authors. (2025). A lightweight intrusion detection system with dynamic feature fusion federated learning for vehicular network security. Sensors, 25(15), 4622.
College of Computing and Informatics
Semester 1 – 2025/2026
Course Code
CYS507
Course Name
Introduction to Cyber Security and Digital Crime
Assessment type
Project
Module
All Modules
Student ID
???
Student Name
???
CRN
14002
Student Mark
Restricted – مقيد
Click and type the title of your article, only capitalize first word and proper nouns
First-name Surname1*, Second-name Surname2 and Third-name Surname3
Affiliation 1, Email address, University, City, Country
Affiliation 1, Email address, University, City, Country
3
Affiliation 1, Email address, University, City, Country
1
2
*Corresponding Author
ABSTRACT
An Abstract is required for every article; it should succinctly summarize the reason for the work, the main findings, and the
conclusions of the study. The abstract should be no longer than 250 words. Do not include artwork, tables, elaborate equations or
references to other parts of the article or to the reference listing at the end. The reason is that the Abstract should be understandable
in itself to be suitable for storage in textual information retrieval systems.
Keywords: Keyword_1; Keyword_2; Keyword_3; Keyword_4; Keyword_5
1. Introduction
An overview about the data you are analysing to answer the analysis questions.
2. Body section
2.1 Data
This section should include a description of the data being analyses (include number of samples in the dataset, attributes and
their types).
2.2 Methods
In this section describe the methods your used to obtain the data and analysis. In addition, describe the machine learning model
you used and detail its development stages (including train/test data split and model optimization details).
2.3 Analysis
Highlight the most important data you used for analysis, include all relevant visualization.
2.4 Results
Include a written description of your analysis result, describe what was analyzed and the conclusions you made from the
analysis followed by relevant visualization.
3. Conclusion
Restate the main results of your analysis and provide any future recommendations.
Acknowledgments
Acknowledgments should be inserted at the end of the article, before the references. When citing names within the
Acknowledgment, do not use Mr., Mrs., Ms., or Miss. List first initial and last name only. Use the Dr. or Prof. title with each name
separately; do not use plural Drs. or Profs. with lists of names.
Restricted – مقيد
References
The journal uses the IEEE Template for references formatting. References in the text should be indicated by Arabic numerals
that run consecutively through the article and appear inside punctuation.
Authors should ensure that all references are cited in the text and vice versa. Authors are expected to check the original source
reference for accuracy. See examples shown in the References section. In text, refer simply to the reference number. Do not use
“Ref.”, “reference” or “Reference [3] shows ….” use as demonstrated in [3], according to [4] and [6-9]. Please do not use automatic
endnotes in Word, rather, type the reference list at the end of the article using the “References” style. The authors encourage using
the “EndNote” software to format and insert the references into the article ( IEEE EndNote template can be
downloaded from ( Below is the references formatting:
Basic format for books:
[1] J. K. Author, “Title of chapter in the book,” in Title of His Published Book, xth ed. City of Publisher, Country if not
[2] USA: Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx.
Examples:
[3]
[4]
G. O. Young, “Synthetic structure of industrial plastics,” in Plastics, 2nd ed., vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123–135.
Basic format for journals:
[5] J. K. Author, “Name of article,” Abbrev. Title of Periodical, vol. x, no. x, pp. xxx-xxx, Abbrev. Month, year.
Examples:
[6]
[7]
[8]
J.
U.
Duncombe,
“Infrared
navigation—Part
of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, no. 1, pp. 34–39, Jan. 1959.
E.
P.
Wigner,
“Theory
of
traveling-wave
vol. 134, pp. A635–A646, Dec. 1965.
E. H. Miller, “A note on reflector arrays,” IEEE Trans. Antennas Propagat., to be published.
I:
optical
An
laser,”
assessment
Phys.
Rev.,
Basic format for reports:
[9] J. K. Author, “Title of report,” Abbrev. Name of Co., City of Co., Abbrev. State, Rep. xxx, year.
Examples:
[10] E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen absorption in the earth’s atmosphere,” Aerospace Corp., Los Angeles, CA, Tech. Rep. TR-0200 (423046)-3, Nov. 1988.
[11] J. H. Davis and J. R. Cogdell, “Calibration program for the 16-foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, Tech. Memo. NGL-006-69-3, Nov.
15, 1987.
Basic format for handbooks:
[12] Name of Manual/Handbook, x ed., Abbrev. Name of Co., City of Co., Abbrev. State, year, pp. xxx-xxx.
Examples:
[13] Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, 1985, pp. 44–60.
[14] Motorola Semiconductor Data Manual, Motorola Semiconductor Products Inc., Phoenix, AZ, 1989.
Basic format for books (when available online):
[15] Author. (year, month day). Title. (edition) [Type of medium]. volume (issue). Available: site/path/file
Example:
[16] J. Jones. (1991, May 10). Networks. (2nd ed.) [Online]. Available:
Basic format for journals (when available online):
[17] Author. (year, month). Title. Journal. [Type of medium]. volume (issue), pages. Available: site/path/file
Example:
[18] R. J. Vidmar. (1992, Aug.). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3), pp. 876–
880. Available:
Basic format for articles presented at conferences (when available online):
[19] Author. (year, month). Title. Presented at Conference title. [Type of Medium]. Available: site/path/file
Example:
Restricted – مقيد
[20] PROCESS
Corp.,
MA.
Intranets:
Internet
technologies deployed behind the firewall for corporate productivity. Presented at
INET96 Annual Meeting. [Online]. Available:
Basic format for reports and handbooks (when available online):
[21] Author. (year, month). Title. Comp any. City, State or Country. [Type of Medium].Available: site/path/file
Example:
[22]
S . L . T a l l e e n . ( 1 9 9 6 , A p r . ) . T h e I n t r a n e t A r c h i -te c tu r e : M a n a g i n g i n f o r m a t i o n i n t h e n e w paradigm. Amdahl Corp., CA.
[Online]. Available:
Basic format for computer programs and electronic documents (when available online).
Example:
[23] A. Harriman. (1993, June). Compendium of genealogical software. Humanist. [Online]. Available e-mail: [email protected] Message: get
GENEALOGY REPORT
Basic format for patents (when available online):
[24] Name of the invention, by inventor’s name. (year, month day). Patent Number [Type of medium]. Available: site/path/file
Example:
[25] Musical toothbrush with adjustable neck and mirror, by L.M.R. Brooks. (1992, May 19). Patent D 326 189
[Online]. Available: NEXIS Library: LEXPAT File: DESIGN
Basic format for conference proceedings (published):
[26] J. K. Author, “Title of article,” in Abbreviated Name of Conf., City of Conf., Abbrev. State (if given), year, pp. xxxxxx.
Example:
[27] D. B. Payne and J. R. Stern, “Wavelength-switched pas- sively coupled single-mode optical network,” in Proc. IOOC-ECOC, 1985,
pp. 585–590.
Example for articles presented at conferences (unpublished):
[28] D. Ebehard and E. Voges, “Digital single sideband detection for interferometric sensors,” presented at the 2nd Int. Conf. Optical Fiber Sensors, Stuttgart,
Germany, Jan. 2-5, 1984.
Basic format for patents:
[29] J. K. Author, “Title of patent,” U.S. Patent x xxx xxx, Abbrev. Month, day, year.
Example:
[30] G.
Brandli
and
U.S. Patent 4 084 217, Nov. 4, 1978.
M.
Dick,
“Alternating
current
fed
power
supply,”
Basic format for theses (M.S.) and dissertations (Ph.D.):
[31] J. K. Author, “Title of thesis,” M.S. thesis, Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State, year.
[32] J. K. Author, “Title of dissertation,” Ph.D. dissertation, Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State, year.
Examples:
[33] J. O. Williams, “Narrow-band analyzer,” Ph.D. dissertation, Dept. Elect. Eng., Harvard Univ., Cambridge, MA, 1993.
[34] N. Kawasaki, “Parametric study of thermal and chemical nonequilibrium nozzle flow,” M.S. thesis, Dept. Electron. Eng., Osaka Univ., Osaka, Japan, 1993.
Basic format for the most common types of unpublished references:
[35] J. K. Author, private communication, Abbrev. Month, year.
[36] J. K. Author, “Title of article,” unpublished.
[37] J. K. Author, “Title of article,” to be published.
Examples:
[38] A. Harrison, private communication, May 1995.
[39] B. Smith, “An approach to graphs of linear forms,” unpublished.
[40] A. Brahms, “Representation error for real numbers in binary computer arithmetic,” IEEE Computer Group Repository, Article R-67-85.
Basic format for standards:
[41] Title of Standard, Standard number, date.
Examples:
[42] IEEE Criteria for Class IE Electric Systems, IEEE Standard 308, 1969.
Restricted – مقيد
[43] Letter Symbols for Quantities, ANSI Standard Y10.5-1968.
Format example
Figure 1. (a) Fairness index, (b) Average Fairness Index
Table 1. Table, version 1
Parameter
Slot time
ACK size
RTS size
CTS size
Data packet size
DIFS interval
SIFS interval
CWmin
CWmax
Bandwidth
Transport protocol
Value
20 μs
20 bytes
25 bytes
20 bytes
1000 bytes
40 μs
10 μs
31
1023
2 Mbps
UDP
Parameter
Slot time
ACK size
RTS size
CTS size
Data packet size
DIFS interval
SIFS interval
CWmin
CWmax
Bandwidth
Transport protocol
Value
20 μs
20 bytes
25 bytes
20 bytes
1000 bytes
40 μs
10 μs
31
1023
2 Mbps
UDP
3.1. Article Size
The Manuscript should be prepared in English language by using MS Word. Article can be up to 12 pages inclusive references
and abstract.
Supply some 3–5 keywords, separated with semicolons, e.g., Azomethine ylide; Claisen rearrangement; Diels-Alder
cycloaddition; Enantioselective catalysis; Ionic liquid; Metathesis; Microwave-assisted synthesis.
Restricted – مقيد
3.2. Tables, figures and schemes
All citations of figure and tables in text must be in numerical order. Citations to figures in text always carry the
word “Figure.”, “Table.” followed by the figure/table number.
You can choose to display figure/table through one column (see Table 1, Figure 1) or across the page (see
Table 2, Figure 2). Remember that we will always also need high-resolution versions of your figures for printing
in (i.e. TIFF) format.
Table 2. Table, version 2
Parameter
Slot time
ACK size
RTS size
CTS size
Data packet size
DIFS interval
Bandwidth
Transport protocol
Value
20 μs
20 bytes
25 bytes
20 bytes
1000 bytes
40 μs
2 Mbps
UDP
Figure 2. Overload on GV and IV vehicles
3.3. Lists
For tabular summations that do not deserve to be presented as a table, lists are often used. Lists may be either
numbered or bulleted. Below you see examples of both.
1. The first entry in the list
2. The second entry
3. A subentry
4. The last entry
•
•
A bulleted list item
Another one
You can use the Bullets and Numbering options in the ‘Formatting’ toolbar of Word ® to create lists. Note that
you should first block the whole list. A sublisting is coded using the ‘Increase Indent’ (go to a sublevel of
numbering) and ‘Decrease Indent’ (go to a higher level of numbering) buttons.
3.4. Equations
Equations within an article are numbered consecutively from the beginning of the article to the end. All
variables are italic. (e.g., x, y, n). Function names and abbreviations are Roman (sin, cos, sinc, sinh), as are units
or unit abbreviations (e.g., deg, Hz,) complete words (e.g., in, out), and abbreviations of words (e.g., max, min),
or acronyms (e.g., SNR).
You can type your equations and use the symbols in the Word ® equation editor or in MathType™. Using the
‘Insert Equation’ option, you can create equations in the Word ® equation editor, or if the MathType™ equation
editor is installed on your computer.
Restricted – مقيد
= (empir,1.388Å) (theor,1.388Å)
(theor) cos
Restricted – مقيد
(1)
| كلية الحوسبة والمعلوماتية
College of Computing and Informatics
Term Project Description
CYS507: Introduction to Cyber Security and Digital Crime
As part of the CYS507: Introduction to Cyber Security and Digital Crime, each student is expected to
choose at least 5 papers (for groups 10 papers) published in 2020 or later. The research papers must be
in one of the following topics: Cloud Security, IoT Security and Intrusion Detection.
The students are expected to read the papers thoroughly, understand the presented problems and their
proposed solutions. You are requested to present the technical solutions. A valuable survey paper should
include comprehensive discussion and comparisons between the presented research papers. Your survey
should include a discussion of possible future work. It is recommended to reference papers that are highly
cited and published in key journals or conferences (e.g., IEEE, Springer, Elsevier, Wiley, and Taylor &
Francis).
The maximum number of groups is two members. Each student/group should send the title of the paper as
well as a half-page description of the subject as well as 3-5 references by the end of week 6 (10/10/2025).
ONLY the corresponding author needs to submit the paper and not by each group members.
Deliverables:
The deliverables of the project should include:
1. A report with the following sections.
a. Abstract: summary of problem statement presented in the papers. (1 mark)
b. Introduction: discuss the main issue as well as the selected context (e.g., Cloud, Wireless
Networks, IoT, Healthcare, etc.) then present briefly the main proposed solution. (1 mark)
c. State-of-the-art: includes the existing solutions (mechanisms, protocols, procedures,
standards, etc.). These should be illustrated using text, diagrams, tables, and figures. (5
marks)
d. Discussion: The student must criticize the existing solutions. He / She also must propose
a possible solution or alternative for some of the weaknesses of the chosen papers. (2
marks)
e. Conclusion: You need to present your insights and include future work. (1 mark)
f. References: The citation should follow the APA style. (1 mark)
g. The template: Use document MSCYS_ProjectTemplate_202410.docx
2. A presentation of 15 – 20 slides to be presented at the end of the semester. (4 marks)
Deadlines:
Deadline to submit the report and the presentation: End of Week 13.
Date of presentation: Week 13 and Week 14.
Purchase answer to see full
attachment