Skip to main content


CSC8208 : Research Methods and Group Project in Security and Resilience

  • Offered for Year: 2020/21
  • Module Leader(s): Dr Sadegh Soudjani
  • Lecturer: Dr Sergiy Bogomolov, Dr John Mace
  • Owning School: Computing
  • Teaching Location: Newcastle City Campus
Semester 2 Credit Value: 20
ECTS Credits: 10.0


To prepare for working on individual research projects
To give experience of reading, discussing and interpreting the professional and research literature
To provide an insight into current and future developments in computer systems
To reflect on the experience of applying the techniques taught in preceding modules to the security and resilience analysis and development of a high integrity computing system
To gain experience of working in groups to complete a set of specified tasks in a timely manner which would involve literature review, software design, implementation, presentation of design and demonstration of the implemented system.

This module aims to provide students an opportunity to research the literature on a given security/resilience topic in computing, to collaborate on a literature review and to design, build and analyse a high integrity computing system with security or safety implications. Students will have access to technical guidance from faculty members, but will essentially work as a small independent team under their own initiative. This provides an opportunity to practice the technical skills developed in other modules, to develop new skills of cooperative working and organization, and to develop research skills in preparation for their individual project and dissertation module .

Outline Of Syllabus

The module is structured in several phases:
- Lectures on research methods delivered intensively:
•       Introduction to research projects and planning; identifying information need; assessing quality and reliability of sources of information
•       Role of peer review in research and system development
•       Critical evaluation of published material
•       How to present claims with supporting arguments
•       Academic report writing; standards in the discipline; use and citation of sources
•       Ethical issues
- Research topics are assigned and groups of 5-7 members are allocated by module leaders, mixing backgrounds, abilities and skills. Groups work together, forming reading circles to collaboratively produce a literature review.
- Groups begin work on the software development exercise. Choice of group organisation is left to the group. Development will involve research, requirements elicitation, modelling and security analysis which may involve information flow modelling, protocol design, deductive or inductive fault analysis. Selection of development methods and tools will be done by each group.
- A presentation is given by groups in week 6 together with group and individual report, which should include a risk assessment of the proposed solution.

Teaching Methods

Module leaders are revising this content in light of the Covid 19 restrictions.
Revised and approved detail information will be available by 17 August.

Assessment Methods

Module leaders are revising this content in light of the Covid 19 restrictions.
Revised and approved detail information will be available by 17 August.

Reading Lists