Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

project cyber security

Description

we need a project in Intrusion Detection including :

1- from the following references and more

2- following the attached templet

3- making a presentation with talking points ( power point )

4- un plagiarized with full citation report with max percentage of plagiarism 25%

5- APA style

6- following the project description

as the following abstract ,,

Due to the rising difficulty of the cyber security vulnerabilities and network security demands a crucial countermeasure in the domain of intrusion detection systems (IDS), specifically in the shared domain like IoT and vehicular networks.

The following proposals expand the implementation of a federated learning (FL) and multi-criteria decision analysis (MCDA) to finally achieve an improved accuracy in the IDS.

federated learning features provide an effective unified learning to the un-centralized structure to enable devices to enhance the detection algorithm concurrently to ensure the confidentiality of the data by limiting the availability [1].

Such mechanisms are critical to IoT applications, when crucial data must be protected.

MCDA also brings systematic structure to measure and choose the most proper features in machine learning-based IDS, to eventually reach an enhanced, adaptive, accurate detection [2].

By joining these approaches, the suggested structure target is to make a resistant, effective IDS able to rapidly Adjust with the rapidly improving vulnerabilities in various networks domains [3].

References:

, Yousuf, R., Sharma, N., & Another Author. (2025). Federated ensembled learning for intrusion detection using IoT network. In Proceedings of the 12th International Conference on Emerging Trends in Engineering & Technology – Signal and Information Processing (ICETET – SIP) (pp. 1-5). IEEE Xplore Digital Library.

, & Sakr, Z. (2025). Application of multi-criteria decision analysis for quantifying responsibility in ML-based intrusion detection systems. Neutrosophic Systems with Applications, 25(8), 769-801.

, Ma, Y., Bai, J., & Additional Authors. (2025). A lightweight intrusion detection system with dynamic feature fusion federated learning for vehicular network security. Sensors, 25(15), 4622.

‫| كلية الحوسبة والمعلوماتية‬
College of Computing and Informatics

Semester 1 – 2025/2026

Course Code

CYS507

Course Name

Introduction to Cyber Security and Digital Crime

Assessment type

Project

Module

All Modules

Student ID

???

Student Name

???

CRN

14002

Student Mark

Restricted – ‫مقيد‬

Click and type the title of your article, only capitalize first word and proper nouns
First-name Surname1*, Second-name Surname2 and Third-name Surname3
Affiliation 1, Email address, University, City, Country
Affiliation 1, Email address, University, City, Country
3
Affiliation 1, Email address, University, City, Country
1
2

*Corresponding Author
ABSTRACT
An Abstract is required for every article; it should succinctly summarize the reason for the work, the main findings, and the
conclusions of the study. The abstract should be no longer than 250 words. Do not include artwork, tables, elaborate equations or
references to other parts of the article or to the reference listing at the end. The reason is that the Abstract should be understandable
in itself to be suitable for storage in textual information retrieval systems.
Keywords: Keyword_1; Keyword_2; Keyword_3; Keyword_4; Keyword_5
1. Introduction
An overview about the data you are analysing to answer the analysis questions.

2. Body section
2.1 Data
This section should include a description of the data being analyses (include number of samples in the dataset, attributes and
their types).
2.2 Methods
In this section describe the methods your used to obtain the data and analysis. In addition, describe the machine learning model
you used and detail its development stages (including train/test data split and model optimization details).
2.3 Analysis
Highlight the most important data you used for analysis, include all relevant visualization.
2.4 Results
Include a written description of your analysis result, describe what was analyzed and the conclusions you made from the
analysis followed by relevant visualization.

3. Conclusion
Restate the main results of your analysis and provide any future recommendations.
Acknowledgments
Acknowledgments should be inserted at the end of the article, before the references. When citing names within the
Acknowledgment, do not use Mr., Mrs., Ms., or Miss. List first initial and last name only. Use the Dr. or Prof. title with each name
separately; do not use plural Drs. or Profs. with lists of names.

Restricted – ‫مقيد‬

References
The journal uses the IEEE Template for references formatting. References in the text should be indicated by Arabic numerals
that run consecutively through the article and appear inside punctuation.
Authors should ensure that all references are cited in the text and vice versa. Authors are expected to check the original source
reference for accuracy. See examples shown in the References section. In text, refer simply to the reference number. Do not use
“Ref.”, “reference” or “Reference [3] shows ….” use as demonstrated in [3], according to [4] and [6-9]. Please do not use automatic
endnotes in Word, rather, type the reference list at the end of the article using the “References” style. The authors encourage using
the “EndNote” software to format and insert the references into the article ( IEEE EndNote template can be
downloaded from ( Below is the references formatting:
Basic format for books:
[1] J. K. Author, “Title of chapter in the book,” in Title of His Published Book, xth ed. City of Publisher, Country if not
[2] USA: Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx.
Examples:
[3]
[4]

G. O. Young, “Synthetic structure of industrial plastics,” in Plastics, 2nd ed., vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123–135.

Basic format for journals:
[5] J. K. Author, “Name of article,” Abbrev. Title of Periodical, vol. x, no. x, pp. xxx-xxx, Abbrev. Month, year.
Examples:
[6]
[7]
[8]

J.
U.
Duncombe,
“Infrared
navigation—Part
of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, no. 1, pp. 34–39, Jan. 1959.
E.
P.
Wigner,
“Theory
of
traveling-wave
vol. 134, pp. A635–A646, Dec. 1965.
E. H. Miller, “A note on reflector arrays,” IEEE Trans. Antennas Propagat., to be published.

I:
optical

An
laser,”

assessment
Phys.

Rev.,

Basic format for reports:
[9] J. K. Author, “Title of report,” Abbrev. Name of Co., City of Co., Abbrev. State, Rep. xxx, year.
Examples:
[10] E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen absorption in the earth’s atmosphere,” Aerospace Corp., Los Angeles, CA, Tech. Rep. TR-0200 (423046)-3, Nov. 1988.
[11] J. H. Davis and J. R. Cogdell, “Calibration program for the 16-foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, Tech. Memo. NGL-006-69-3, Nov.
15, 1987.
Basic format for handbooks:
[12] Name of Manual/Handbook, x ed., Abbrev. Name of Co., City of Co., Abbrev. State, year, pp. xxx-xxx.
Examples:
[13] Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, 1985, pp. 44–60.
[14] Motorola Semiconductor Data Manual, Motorola Semiconductor Products Inc., Phoenix, AZ, 1989.
Basic format for books (when available online):
[15] Author. (year, month day). Title. (edition) [Type of medium]. volume (issue). Available: site/path/file
Example:
[16] J. Jones. (1991, May 10). Networks. (2nd ed.) [Online]. Available:
Basic format for journals (when available online):
[17] Author. (year, month). Title. Journal. [Type of medium]. volume (issue), pages. Available: site/path/file
Example:
[18] R. J. Vidmar. (1992, Aug.). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3), pp. 876–
880. Available:
Basic format for articles presented at conferences (when available online):
[19] Author. (year, month). Title. Presented at Conference title. [Type of Medium]. Available: site/path/file
Example:

Restricted – ‫مقيد‬

[20] PROCESS
Corp.,
MA.
Intranets:
Internet
technologies deployed behind the firewall for corporate productivity. Presented at
INET96 Annual Meeting. [Online]. Available:
Basic format for reports and handbooks (when available online):
[21] Author. (year, month). Title. Comp any. City, State or Country. [Type of Medium].Available: site/path/file
Example:
[22]

S . L . T a l l e e n . ( 1 9 9 6 , A p r . ) . T h e I n t r a n e t A r c h i -te c tu r e : M a n a g i n g i n f o r m a t i o n i n t h e n e w paradigm. Amdahl Corp., CA.
[Online]. Available:

Basic format for computer programs and electronic documents (when available online).
Example:
[23] A. Harriman. (1993, June). Compendium of genealogical software. Humanist. [Online]. Available e-mail: [email protected] Message: get
GENEALOGY REPORT
Basic format for patents (when available online):
[24] Name of the invention, by inventor’s name. (year, month day). Patent Number [Type of medium]. Available: site/path/file
Example:
[25] Musical toothbrush with adjustable neck and mirror, by L.M.R. Brooks. (1992, May 19). Patent D 326 189
[Online]. Available: NEXIS Library: LEXPAT File: DESIGN
Basic format for conference proceedings (published):
[26] J. K. Author, “Title of article,” in Abbreviated Name of Conf., City of Conf., Abbrev. State (if given), year, pp. xxxxxx.
Example:
[27] D. B. Payne and J. R. Stern, “Wavelength-switched pas- sively coupled single-mode optical network,” in Proc. IOOC-ECOC, 1985,
pp. 585–590.
Example for articles presented at conferences (unpublished):
[28] D. Ebehard and E. Voges, “Digital single sideband detection for interferometric sensors,” presented at the 2nd Int. Conf. Optical Fiber Sensors, Stuttgart,
Germany, Jan. 2-5, 1984.
Basic format for patents:
[29] J. K. Author, “Title of patent,” U.S. Patent x xxx xxx, Abbrev. Month, day, year.
Example:
[30] G.
Brandli
and
U.S. Patent 4 084 217, Nov. 4, 1978.

M.

Dick,

“Alternating

current

fed

power

supply,”

Basic format for theses (M.S.) and dissertations (Ph.D.):
[31] J. K. Author, “Title of thesis,” M.S. thesis, Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State, year.
[32] J. K. Author, “Title of dissertation,” Ph.D. dissertation, Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State, year.
Examples:
[33] J. O. Williams, “Narrow-band analyzer,” Ph.D. dissertation, Dept. Elect. Eng., Harvard Univ., Cambridge, MA, 1993.
[34] N. Kawasaki, “Parametric study of thermal and chemical nonequilibrium nozzle flow,” M.S. thesis, Dept. Electron. Eng., Osaka Univ., Osaka, Japan, 1993.
Basic format for the most common types of unpublished references:
[35] J. K. Author, private communication, Abbrev. Month, year.
[36] J. K. Author, “Title of article,” unpublished.
[37] J. K. Author, “Title of article,” to be published.
Examples:
[38] A. Harrison, private communication, May 1995.
[39] B. Smith, “An approach to graphs of linear forms,” unpublished.
[40] A. Brahms, “Representation error for real numbers in binary computer arithmetic,” IEEE Computer Group Repository, Article R-67-85.
Basic format for standards:
[41] Title of Standard, Standard number, date.
Examples:
[42] IEEE Criteria for Class IE Electric Systems, IEEE Standard 308, 1969.

Restricted – ‫مقيد‬

[43] Letter Symbols for Quantities, ANSI Standard Y10.5-1968.

Format example

Figure 1. (a) Fairness index, (b) Average Fairness Index
Table 1. Table, version 1
Parameter
Slot time
ACK size
RTS size
CTS size
Data packet size
DIFS interval
SIFS interval
CWmin
CWmax
Bandwidth
Transport protocol

Value
20 μs
20 bytes
25 bytes
20 bytes
1000 bytes
40 μs
10 μs
31
1023
2 Mbps
UDP

Parameter
Slot time
ACK size
RTS size
CTS size
Data packet size
DIFS interval
SIFS interval
CWmin
CWmax
Bandwidth
Transport protocol

Value
20 μs
20 bytes
25 bytes
20 bytes
1000 bytes
40 μs
10 μs
31
1023
2 Mbps
UDP

3.1. Article Size
The Manuscript should be prepared in English language by using MS Word. Article can be up to 12 pages inclusive references
and abstract.
Supply some 3–5 keywords, separated with semicolons, e.g., Azomethine ylide; Claisen rearrangement; Diels-Alder
cycloaddition; Enantioselective catalysis; Ionic liquid; Metathesis; Microwave-assisted synthesis.

Restricted – ‫مقيد‬

3.2. Tables, figures and schemes
All citations of figure and tables in text must be in numerical order. Citations to figures in text always carry the
word “Figure.”, “Table.” followed by the figure/table number.
You can choose to display figure/table through one column (see Table 1, Figure 1) or across the page (see
Table 2, Figure 2). Remember that we will always also need high-resolution versions of your figures for printing
in (i.e. TIFF) format.
Table 2. Table, version 2
Parameter
Slot time
ACK size
RTS size
CTS size
Data packet size
DIFS interval
Bandwidth
Transport protocol

Value
20 μs
20 bytes
25 bytes
20 bytes
1000 bytes
40 μs
2 Mbps
UDP

Figure 2. Overload on GV and IV vehicles
3.3. Lists
For tabular summations that do not deserve to be presented as a table, lists are often used. Lists may be either
numbered or bulleted. Below you see examples of both.
1. The first entry in the list
2. The second entry
3. A subentry
4. The last entry

A bulleted list item
Another one

You can use the Bullets and Numbering options in the ‘Formatting’ toolbar of Word ® to create lists. Note that
you should first block the whole list. A sublisting is coded using the ‘Increase Indent’ (go to a sublevel of
numbering) and ‘Decrease Indent’ (go to a higher level of numbering) buttons.
3.4. Equations
Equations within an article are numbered consecutively from the beginning of the article to the end. All
variables are italic. (e.g., x, y, n). Function names and abbreviations are Roman (sin, cos, sinc, sinh), as are units
or unit abbreviations (e.g., deg, Hz,) complete words (e.g., in, out), and abbreviations of words (e.g., max, min),
or acronyms (e.g., SNR).
You can type your equations and use the symbols in the Word ® equation editor or in MathType™. Using the
‘Insert Equation’ option, you can create equations in the Word ® equation editor, or if the MathType™ equation
editor is installed on your computer.

Restricted – ‫مقيد‬

 =   (empir,1.388Å) (theor,1.388Å) 
  (theor) cos 

Restricted – ‫مقيد‬

(1)

‫| كلية الحوسبة والمعلوماتية‬
College of Computing and Informatics

Term Project Description
CYS507: Introduction to Cyber Security and Digital Crime
As part of the CYS507: Introduction to Cyber Security and Digital Crime, each student is expected to
choose at least 5 papers (for groups 10 papers) published in 2020 or later. The research papers must be
in one of the following topics: Cloud Security, IoT Security and Intrusion Detection.
The students are expected to read the papers thoroughly, understand the presented problems and their
proposed solutions. You are requested to present the technical solutions. A valuable survey paper should
include comprehensive discussion and comparisons between the presented research papers. Your survey
should include a discussion of possible future work. It is recommended to reference papers that are highly
cited and published in key journals or conferences (e.g., IEEE, Springer, Elsevier, Wiley, and Taylor &
Francis).
The maximum number of groups is two members. Each student/group should send the title of the paper as
well as a half-page description of the subject as well as 3-5 references by the end of week 6 (10/10/2025).
ONLY the corresponding author needs to submit the paper and not by each group members.
Deliverables:
The deliverables of the project should include:
1. A report with the following sections.
a. Abstract: summary of problem statement presented in the papers. (1 mark)
b. Introduction: discuss the main issue as well as the selected context (e.g., Cloud, Wireless
Networks, IoT, Healthcare, etc.) then present briefly the main proposed solution. (1 mark)
c. State-of-the-art: includes the existing solutions (mechanisms, protocols, procedures,
standards, etc.). These should be illustrated using text, diagrams, tables, and figures. (5
marks)
d. Discussion: The student must criticize the existing solutions. He / She also must propose
a possible solution or alternative for some of the weaknesses of the chosen papers. (2
marks)
e. Conclusion: You need to present your insights and include future work. (1 mark)
f. References: The citation should follow the APA style. (1 mark)
g. The template: Use document MSCYS_ProjectTemplate_202410.docx
2. A presentation of 15 – 20 slides to be presented at the end of the semester. (4 marks)
Deadlines:
Deadline to submit the report and the presentation: End of Week 13.
Date of presentation: Week 13 and Week 14.

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Presentation 487

Description see College of Computing and Informatics Project Deadline: Tuesday 30/11/2025 @ 23:59 [Total Mark is 14] Student Details: CRN: Name: Name: Name: ID: ID: ID: Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated

Management Question

Description I want the answer without similarity at all, and Conceptual and professional, they’re important. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Introduction to International Business (MGT 321) Due Date: 06/12/2025

mng311,hosaaammmm

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

Final report-430

Description Work through the files named “final report-word” and “final presentation.” The work should be based on the information provided in the attached files. College of Administration and Finance Sciences Form Number 3 – PERIODIC REPORT Internship Student Report | Month: March Start Date: 00/00/2025 End Date: 00/00/2025 Student’s Name:Aishah

Management Question

Description convert the following file into PP slides that contain main points and bullet points to discuss briefly. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment Three FIN403: Investments Due Date: 06/12/2025 @

rewrite the content in an academic style and remove repetition and unnecessary wording

Description ‫| كلية الحوسبة والمعلوماتية‬ College of Computing and Informatics College of Computing & Informatics (CCI) SENIOR PROJECT-I REPORT Unified Volunteering Passport (UVP) Application Author(s): S220036090 Abdulaziz Khamis Alghamdi S220028092 Abdulmalik Bader Aljayzani S220021519 Luai Abdullah Alnufaie S220003552 Mohammed Tourky Attar S220032502 Yasser Lutfi Aljedaani S220028482 Majed Ghazi Alsagri Project

Project IT405 (e-Portals Development)

Description Hello i have projecet for IT405 (e-Portals Development) College of Computing and Informatics Project Deadline: Sunday 30/11/2025 @ 23:59 [Total Mark is #14] Student Details: CRN: Name: Name: Name: Name: ID: ID: ID: ID: Instructions: • You must submit two separate copies (one Word file and one PDF file)

mgt403-Asignmennt3

Description 5. Conclusion (1.5 Points) • Summarize the anticipated benefits of implementing your recommendations for XYZ Dynamics’ long-term success. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 MGT403 (1st. Term 2025-2026) Deadline:6th

Critical Thinking – Operation Management

Description – I want original text, no plagiarism. – You can find the instructions in the file. Please read it carefully. – APA Style. – Please use the same cover page file to include the solutions. Thanks – Textbook: Stevenson, W. (2021). Operations management (14th ed.). New York, NY: McGraw-Hill

MGT 201 case study and critical thinking

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University Department of Business Administration College of Administrative and Financial Sciences Assignment 3 Due Date: 6th Dec 2025 @ 23:59 Course Name: Marketing Management Student’s Name: Course Code: MGT 201 Student’s ID

Management Question

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Human Resources Management (MGT 211) Due Date: 06/12/2025 @ 23:59 Course Name: HR Management Student’s Name: Course Code: MGT211 Student’s ID Number: Semester:

MGT 311 critical thinking

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University Department of Business Administration College of Administrative and Financial Sciences Assignment 3 Introduction to operations Management (MGT 311) Due Date: 6th December 2025 @ 23:59 Course Name: Introduction to Operations Management

mng402,dosary

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

it245,projjjekt

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

mng324,hesham

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

Project 487

Description see College of Computing and Informatics Project Deadline: Tuesday 30/11/2025 @ 23:59 [Total Mark is 14] Student Details: CRN: Name: Name: Name: ID: ID: ID: Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated

mng325.hesham

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

mng401.hesham

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not