This coursework requires a high level specification of the system. You are required to analyse the system and
1. Identify all groups of users;
2. Identify all functions that each group of users will be able to perform on the system;
SIT716 Computer Networks and Security
Evidence of Learning represents the journal or record of the work you have undertaken in completing a study of the content of the SIT716 unit.
IoT NETWORK SECURITY AND USE OF GANs IN IoT
This assessment requires you to complete two distinct sections:
(1) provide a literature review for your thesis.
This requires you to review and critique the written literature relating to your topic to identify gaps in previous studies to support your study’s intended unique contribution to knowledge in your field.
IoT NETWORK SECURITY AND USE OF GANs IN IoT – II
When working on this task, one should refer to the approved research topics provided within their research area and consult with the supervisor who is overseeing the topic area. Choosing and justifying an appropriate methodology to investigate a topic is one of the key tasks of a professional researcher.
IoT NETWORK SECURITY AND USE OF GANs IN IoT – I
The purpose and overall aim of your research will be revealed through identification of the broad research objective(s). You need to clearly identify what the purpose of the research This will be based on what you are trying to achieve with your research. This section aligns to your background and clearly addresses a gap in the current literature in your field.
Network Science
Show the plot of the modularity against the number of communities on your network
for both the Girvan-Newman and the Greedy algorithms in the same image. Compare the best
partition according to modularity for both methods. Relate your results to the nature of your
network.