Professional Documents
Culture Documents
Explain your motivation in this project.. How did you select the contract tracing applications?
Explain which contract tracing applications you selected.
Explain which tools you selected for testing.
….
Figure 1-SLR process used in this study (sample caption for figure)
4 LESSONS LEARNED
Explain the lessons learned here…what were the challenges? How did you handle these challenges?
5 CONCLUSION
The contributions of this article are three-fold:
3
6 REFERENCES
[1] Gibert, D., Mateu, C., & Planes, J. (2020). The rise of machine learning for detection and classification of malware: Research
developments, trends and challenges. Journal of Network and Computer Applications, 153, 102526.
[2] Carlin, D., Burgess, J., O'Kane, P., & Sezer, S. (2019). You could be mine (d): the rise of cryptojacking. IEEE Security & Privacy, 18(2),
16-22.