Description: prepare a Review or Critique paper of the given articles:
Collin Jackson et al., “Protecting Browsers from DNS Rebinding Attacks”, In Proceedings of ACM CCS, 2009.
Robin Sommer and Vern Paxson, “Enhancing Byte-Level Network Intrusion Detection Signatures with Context”, Proceedings of the 10th ACM Conference on Computer and Communication Security, 2003.
These articles were chosen from the assigned readings, “Articles of the Week”.
For each and every article, use the given guide to structure your review:
Article Review Structure:
A) Article Citation: prepare a complete and accurate citation for the article by using APA format.
B) Summary: At the starting of your review, summarize each article by using your own words to expertly demonstrate an in-depth understanding of the article.
C) Analysis: This is the main part of your review. Your analysis must comprise:
• What are the article’s main contributions and strengths?
• Are there any weaknesses and limitations?
• Are there possible enhancements?
How does the article compare or contrast with other articles which the class has read so far? What concepts, ideas or methods read elsewhere strengthen or weaken this paper? Which articles and books in the bibliography would you suggest to your classmates to give a better understanding of the topic?
D) Discussion or Conclusion: Your review of each article must end with your discussion and conclusions. For illustration, you can present a list of issues or problems to initiate discussion (this can be accomplished by proposing an argument for or against a given method) and/or give your thoughts or opinions or summary of the article.
Note: You are expected to support your analysis and discussions with documented sources in the proper APA format.
A) Print format: MS Word or PDF format.
B) The general structure of your review or critique paper:
• Name and Title
• Brief Intro
• Your critique/review of paper #1
• Your critique/review of paper #2
C) The paper length: 8-12 double spaced pages. Follow the APA format.