Academic Integrity What is and is not OK I encourage you to work with others to learn the material but everyone must DO their work ALONE Do not to turn in the work of others Do not give others your work to use as their own Do not plagiarize from others(published or not) Do not try to deceive the instructor See the Web site More guidelines on academic integrity Links to university resources Ask if in doubt You can always ask me or TA for help! Others: "The student's behavior in the classroom shall be conducive to the teaching and learning process for all concerned.” -"No student shall...interfere with the functions and services of the University (for example,but not limited to,classes...)such that the function or service is obstructed or disrupted.Students whose conduct adversely affects the learning environment in this classroom may be subject to disciplinary action through the Student Faculty Judiciary process." 11
11 What is and is not OK ─ I encourage you to work with others to learn the material but everyone must DO their work ALONE ─ Do not to turn in the work of others ─ Do not give others your work to use as their own ─ Do not plagiarize from others (published or not) ─ Do not try to deceive the instructor See the Web site ─ More guidelines on academic integrity ─ Links to university resources ─ Ask if in doubt You can always ask me or TA for help! Others: ─ “The student's behavior in the classroom shall be conducive to the teaching and learning process for all concerned.” ─ “No student shall … interfere with the functions and services of the University (for example, but not limited to, classes …) such that the function or service is obstructed or disrupted. Students whose conduct adversely affects the learning environment in this classroom may be subject to disciplinary action through the Student Faculty Judiciary process.” ─ … Academic Integrity
Security Conferences IEEE Symposium on Security and Privacy -http://www.ieee-security.org/TC/SP-Index.html USENIX Security Symposium -http://www.usenix.org/events/sec10/ ACM Conference on Computer and Communications Security (CCS) -http://www.sigsac.org/ccs.html Annual Network and Distributed System Security Symposium -http://www.isoc.org/isoc/conferences/ndss/10/ ■ Security papers are also published in many networking and system conferences:SIGCOMM,SIGMETRICS,SOSP,ICNP. INFOCOM.ICDCS,NSDI,Mobicom,DSN,Mobihoc,CoNext. etc. 12
12 Security Conferences IEEE Symposium on Security and Privacy ─ http://www.ieee-security.org/TC/SP-Index.html USENIX Security Symposium ─ http://www.usenix.org/events/sec10/ ACM Conference on Computer and Communications Security (CCS) ─ http://www.sigsac.org/ccs.html Annual Network and Distributed System Security Symposium ─ http://www.isoc.org/isoc/conferences/ndss/10/ Security papers are also published in many networking and system conferences: SIGCOMM, SIGMETRICS, SOSP, ICNP, INFOCOM, ICDCS, NSDI, Mobicom, DSN, Mobihoc, CoNext, etc