Section 1: Introduction – In this section, you will discuss your topic in details and what kind of cybersecurity problem you are trying to resolve.
1.1 Overview (Background of the Problem)
1.2 Research Question (what you are trying to solve) 1.3 Significance (Purpose of the research)
1.4 Research Contributions (to the industry)
Section 2: Review of the Literature – In this section, you need to review several literature and summaries them. The literature review will help to support research question and Significance (section 1). Also, ONLY scientific journals, peer review articles/papers, books and Government publications are accepted for the literature review . News report publications are NOT accepted.
2.1 Overview
2.2 Summary of all Journals, books, articles, and papers that have reviewed . It should be
Minimum of five (requirement for the paper) literature review.
Section 3: Methodology or model – In this section, you will discuss your model/design on how you have resolved the problem in section 1.
3.1 Overview
3.2 Methodology/Model – Your methodology/model/solution should resolve the
problem in section 1. Also, best approach is to have some technical solution to the problem. 3.2 Results – Did you resolve/answer the question in section 1?