Instructions For Scientific Project and Report: TDDC03 Information Security
Instructions For Scientific Project and Report: TDDC03 Information Security
John Wilander
[email protected]
Institutionen för datavetenskap
Linköpings universitet
1.1 Deadlines
There are deadlines for the project. They guide you through the process of
studying, working, testing and writing about your subject. You are required to
keep track of and meet all the deadlines.
• “In table 3.4 our experimental results are summarized and they show that
a performance increase of up to 20 percent is possible with the tool.”
• “Testing of software will not find all bugs in the general case [3].”
...
“[3] Beizer, Boris: Software Testing Techniques, 2nd Ed. ISBN 1-850-
32880-3”
When you reference something it’s good practice to make the sentence mean-
ingful even without the reference (try taking the reference out and read the
sentence). Example:
• “This problem is explained by George Evans in his paper from 1997 [1].”
3
2.2 Do Not Copy or Rephrase
Copying or rephrasing of material is not allowed in the report. If you copy or
rephrase you might be charged with cheating and expelled from the university.
What we mean with copying and rephrasing:
1. Copying. Text copied from any kind of source (Internet, books, reports
etc) without clearly marking such sections with quotation marks (””) and
providing a reference to the quoted material in direct connection to that
section of the text. If you are not going to quote, never copy and paste
the material into your report at all, write on your own. Since this is your
report, you are not supposed to quote large portions of text.
2. Rephrasing. Rephrased copies of text from any kind of source (Internet,
books, reports etc). Rephrasing should be avoided—instead write/explain
in your own words, or write the original text and mark is as a quote (see
above). Two examples of rephrasing:
Original 1: ”There are several (partially overlapping) definitions of func-
tional requirements.”
Rephrased 1: ”Functional requirements have several (partially overlap-
ping) definitions.
Original 2: ”Man-in-the-middle attacks usually occur in networks with
several connected computers.”
Rephrased 2: ”Typically, Man-in-the-middle attacks will appear in net-
works with several computers connected to it.”
What we mean with rephrasing here is if you first copy a text, and then
do rephrasing of the copied material as shown by our examples above.
4
2.5.1 The Abstract
An abstract is not a teaser nor an introduction. Although making the reader
interested is nice, the abstract’s first and foremost role is to efficiently position
the paper and shortly describe its contributions. After reading the abstract the
reader should know what to expect from the paper including its main conclu-
sions.
5
Table 1: Empirical test of dynamic intrusion prevention tools. 20 attack forms
tested. “Prevented” means that the process execution is unharmed. “Halted”
means that the attack is detected but the process is terminated.
[This caption fully explains the contents of the table, and is correctly placed
above.]
6
3 For Swedes Writing in English
• “Efficient” means “effektiv”. “Effective” means “effektfull”, “har effekt”
or “har verkan”.
• “Different” almost always means “annorlunda”. “Various” means “olika”.
• “Construction” means “bygge” or “byggnad”. “Design” means “konstruk-
tion”.
• Look up the difference between the words “safety” and “security” before
you use them.
• Headlines are capitalized except for some short words. Example: Simple
and Precise Type Inference of Parametric Polymorphism.
4 Checklist
Go through this checklist before handing in anything to the supervisor.
9. We have checked the spelling and the grammar in the whole report
GOOD LUCK!