国产一区二区三区香蕉-2020国产成人精品视频-欧美日韩亚洲三区-www.91桃色-最美情侣中文第5季免费观看-久草毛片-国产成人精品av-男女猛烈拍拍拍无挡视频-中文字幕看片-色视频欧美一区二区三区-久久久久久久久久影院-一级a爱片久久毛片-精品久久久久久无码中文字幕一区-欧美色图网站-无码色偷偷亚洲国内自拍-国产一区在线免费观看

CSC8208代做、代寫(xiě)Java/c++編程設(shè)計(jì)

時(shí)間:2024-03-09  來(lái)源:  作者: 我要糾錯(cuò)



CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
CSC8208: Module Handbook
Carlton Shepherd and Shishir Nagaraja
{carlton.shepherd,shishir.nagaraja}@ncl.ac.uk
March 1, 2024
1 Introduction
Welcome to CSC8208: Research Methods and Group Project in Security and Resilience! In this module, you
will work as a team to research, design, implement, and evaluate a software system within the context of a
security-related topic. This handbook aims to establish the expectations, module structure, assessment and
marking criteria, and the way in which teams will be chosen and monitored during the course of this module.
In this module, you will gain experience with reading and understanding research papers within the field of
cyber security. In the last 25 years, 3015 papers have been published in the top four security-research conferences. New security knowledge is often first published in scientific papers; the skill for reading, assimilating,
and communicating new knowledge is a crucial one in the long term.
You will work largely independently as a team using your own initiative with minimal supervision. This
is similar to the way in which your individual project (dissertation) supervisor will likely operate. Lectures
are delivered to support the development of your group projects, covering material on reading and writing
papers, evaluation methods, and more. On CSC8208, all course materials and discussions will be hosted and
conducted respectively on Canvas for later reference.
The following academic staff will deliver CSC8208 this academic year:
• Prof. Shishir Nagaraja: Co-module Leader.
• Dr. Carlton Shepherd: Co-module Leader.
2 Module Calendar
During this module, you will go through a series of lectures to help you learn best practices in reading and
presenting research, and writing a report on your findings. You will be organised into groups of approximately
eight members per team. You will then briefly read all papers towards the Assessment 1: Literature Review,
Threat Model & Security Policy. Assessment 1 involves concisely summarising a subset of these research
papers, which should assist you in the final report.
The rest of the module is dedicated for the collaborative Group Project as outlined in Assessment 2: Project
Report. Your project must also be demonstrated. Students are expected to start working on a comprehensive
project that is meticulously executed and documented in a report.
2.1 Lectures
The lectures are scheduled to be delivered in the following order:
1. Module introduction. 10:30–11:30, Monday 12th February 2024.
2. Project briefing. 11:30–12:30, Thursday 15th February 2024.
3. Establishing a common vocabulary on security and resilience. 10:30–11:30, Monday 19th February 2024.
4. Implementation guidance. 11:30–12:30, Thursday 22nd February 2024.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 1
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
5. How to read a research paper. 10:30–11:30, Monday 26th February 2024.
6. Writing and presenting a project. 11:30–12:30, Thursday 29th February 2024.
7. How to evaluate a project (Part 1). 10:30–11:30, Monday 4th March 2024.
8. How to evaluate a project (Part 2). 11:30–12:30, Thursday 7th March 2024.
Location: FDC.G.06.
2.2 Tutorial Sessions
Several tutorial sessions are scheduled in your timetable. It is expected that one member per team, at an
absolute minimum, will attend in order to provide a update on the team’s progress at each session. Team
mechanics are described in greater detail in §4. These sessions take place on:
1. 26th February 2024.
2. 4th March 2024.
3. 11th March 2024 (For the formative assessment of teams 1–11).
4. 18th March 2024 (For the formative assessment of teams 12–22).
Location: USB 1.006 at 13:30–14:30.
2.3 Assessment Deadlines
The following assessments are set, along with their respective weightings:
1. Literature Review, Threat Model and Security Policy (30%): This assessment broken down into:
(a) 20%: Summarise three research papers from the repository provided on Canvas. These focus on
different research directions, such as system security, malware, and Internet of Things security. Each
summary should be ∼1,000 words.
(b) 5%: Submit a threat model that you will address specifically in your secure chat project. This includes a concise description of the attackers and attack methods with appropriate justification.
(c) 5%: Submit a security policy comprising a concise set of rules (bullet points) which can serve as the
security requirements that, if met, will successfully protect against the attackers in the threat model.
Your submission must have a maximum length of 5 pages in total using the IEEE Computer Society
double-column conference template. Markers will be under no obligation to mark beyond this: you
may miss out on marks if you exceed this limit.
• Due date: 4th March 2024.
• Submission type: PDF.
2. Presentation (Optional/Formative): A verbal presentation in an elevator pitch style of your developed
project. This should be delivered in person on 11th March 2024 (Teams 1–11) and 18th March 2024
(Teams 12–22). It should be 5 minutes in duration. There is no formal marking scheme.
3. Final Group Report (70%): Presents your developed solution to the project brief. Your report must be
max. 10 pages, again using the IEEE template. Markers will be under no obligation to mark beyond this.
You must also submit a video file that demonstrates a working project.
• Due date: 22nd March 2024.
• Submission type. a PDF (report) and ZIP file containing your software artefact AND a video
demonstration of your project (e.g. MPEG4).
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 2
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
All assessments are group-based. Marks are distributed to individuals using the formula described later in
§4.3. Within each assessment, we expect that students submit their contribution percentages within an
appendix chapter.
NESS must be used for submitting your assessments.
3 Project Brief: A Secure Chat System
Secure communication is a major concern for personal and professional use, with numerous solutions having
emerged over the years. The current wave of secure chat clients dates as far back as 2004 with the development
of the Off-the-record (OTR) messaging protocol [1], which supports secure instant messaging with message
encryption, authentication, and forward secrecy. Signal, Theema, Telegram, and WhatsApp represent some of
the most widely used secure messaging solutions in today’s marketplace.
In this project, you are tasked to design, implement, and evaluate a chat system that provides one-to-one
or group-based communication. Your system must allow at least two communicating entities to send and
transmit messages over a secure channel to each other. You have two overarching tasks to complete, which are
described in the following subsections.
3.1 Task 1: Literature Review, Threat Model, and Security Policy
You will begin with a literature survey by selecting and reviewing any three research papers from a predetermined list of scholarly articles provided by the staff. You should briefly read all papers before selecting
and reviewing three papers that you deem most interesting and appropriate from which to develop your final
project (Task 2). Be mindful of a literature review’s purpose: it is not a list of papers described uncritically.
This is the first part of the assessment.
In the second part of the assessment, a threat model and security policy will be devised, pertaining specifically
to your project. The definition of a “secure” chat system is left purposely vague for you to define. Therefore,
you are required to submit a threat model and a security policy aligned with your chosen theme and research
papers. The threat model will concisely state the potential threats and the attacker capabilities that your project
will address. This should be a brief (0.5 page) description. You must also present a basic security policy. This
will be presented as a concise set of rules, i.e. bullet points, which can serve as the security requirements that
if met, will successfully protect against attackers (1 page).
Your group-based paper reviews, threat model, and security policy attracts 30% of the overall module mark.
A breakdown of the marking criteria is given in §5.
3.2 Task 2: Build and Write-up Your System
The design, implementation, and evaluation of your own secure chat system is the main task in this module.
Your system is described in the final report, which must be written in the style of a scientific paper, attracting
70% of the module mark. Broadly, your report should include introducing the problem, providing a related
work section, discussing your design and implementation decisions, how you evaluated your system, and
conclusions with directions for future research. In the report, you will primarily be assessed with respect to
three dimensions: 1 security, 2 resilience, and 3 innovation. The strength of your project’s introduction,
evaluation, and presentation are also assessed.
3.2.1 Dimension 1: Security
This dimension assesses how your system addresses a reasonable threat model and security policy.1 The quality
of the mitigations is of paramount importance. Good projects are expected to use mitigations that follow
current best practices and use existing libraries (e.g. see “don’t roll your own crypto” in §6).
1Your threat model and security policy may be refined from the first assessment for your final project report.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 3
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
For the avoidance of ambiguity, we expect the following to be satisfied as minimum ‘must have’ requirements in
order to achieve a basic pass:
• Confidentiality: Ensure that any transmitted messages between clients cannot be trivially read over a
network medium.
• Integrity/authenticity: Ensure that trivial changes to any transmitted messages can be detected. For
example, if A sends “Let’s meet at 9am tomorrow” to B, then a third party, C, should not be able to change
this to “Let’s meet at 10pm tomorrow” without it being detected.
• User authentication: How will you ensure that only a given user can log into their account? For example,
through the implementation of secret-based methods, e.g. requiring passwords or biometrics to log in.
Beyond this, higher-scoring projects should convincingly provide additional features. As a general guideline, a merit-level project should implement one of the following; a distinction-level project would implement
more than one of:
1. Secure file transfer: In addition to simple messages (strings), can you enable the secure transmission of
files, e.g. PDFs and images, between clients in an efficient way?
2. Message self-destruction/deletion: Can you enable users to delete messages in a way that leaves no trace
of them on their device, server etc.? This could be time-based, e.g. similar to WhatsApp’s time-limited
messages, or on demand from the user.
3. Secure persistent message storage: How could you ensure that messages are stored securely at rest?
This could applied to the user’s device or the chat server.
4. Biometrics: To enhance usability, could you enable users to log in to their accounts using their fingerprint, or facial image etc.?
3.2.2 Dimension 2: Resilience
Implementing resilience into any chat system requires various considerations to ensure reliability and robustness. As a minimum requirement to achieve a pass in this dimension, your project should allow more than
one communication session at a time. Beyond this, it is expected that you explore a wider range of techniques
to protect against unintended faults. A good (merit-level and above) project should implement at least one of
the following aspects:
1. Redundancy and failover: Can you use multiple servers/instances to ensure that, if one server/instance
fails, another can take it over seamlessly?
2. Data backup, replication, and recovery: Does your project regularly backup data and have a recovery
plan in place? The goal would be to quickly restore your service in the event of a major system failure.
3. System monitoring. You may implement substantial alerting mechanisms, for example, to help identify
and remedy faults and other issues as they arise.
4. Scalability. How will your system handle large amounts of traffic, which may hinder the delivery of
legitimate messages (among other problems)? Design mechanisms that gracefully handle this increased
load.
To be clear, implementing a comprehensive range of resilience techniques, commensurate with a productiongrade system, is not necessary in this module. See the marking criteria in §5 for additional guidance.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 4
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
3.2.3 Dimension 3: Innovation
This final component assesses the innovation of your project; that is, how it provides new features, or addresses
new requirements, in a way that goes beyond existing secure chat systems.
Some ideas for novelty include:
1. Privacy-enhancing technologies: To what extent can differential privacy, private contact discovery, or
data obfuscation be applied in a novel way?
2. How could machine learning be integrated in your solution in a new way? For example, for detecting
fake/malicious clients or unauthorised users of devices in real-time (continuous user authentication)?
3. Information hiding: How can steganography be incorporated in a new way to covertly transmit secrets
in the presence of adversaries who may have access to messages?
4. Blockchain: To what extent could blockchain be used in a secure messaging system?
You may also express your innovation through the project’s engineering with clearly justified benefits. For
example, you may utilise a new network or system architecture (e.g. supporting decentralisation); using an
interesting network medium over which to communicate messages; using readily available hardware security
technologies to protect encryption keys; and more. This should be convincingly justified in your report.
3.3 Module Flowchart
To help your understanding of CSC8208’s structure, we illustrate the different stages and times in Figure 1.
4 Team Mechanics
To be successful in this module, it is critical to learn to work effectively within a team of people whom you
may not know. This is to replicate a real-world environment: just like the workplace, you may have never
worked with, or have even met, your teammates before this module. To this end, you will be stratified into
groups of approximately eight members each, comprising members from different M.Sc. programmes within
the School of Computing. Please note that the staff will allocate the teams; students will not be able to form
teams themselves. Changing teams is also prohibited unless there are exceptional circumstances with the
approval of the module leadership. This is to ensure diversity and consistency across teams.
4.1 Team Leader
Once you have been allocated to teams, it is imperative that you make contact as a collective as soon as possible.
Each team must nominate a leader whose responsibilities include:
• Arranging and leading group meetings. Includes physical/virtual meetings, setting agendas and delegation. It is important to re-emphasise that module staff are not responsible for arranging your team
meetings, nor can they expected to attend them.
• Submitting group assessments. To ensure consistency, each team leader shall submit assignments on
behalf of the group (literature review, presentation, and final group report).
• Planning the team’s activities. A concrete plan is an important component in ensuring that assessments
are submitted on time, with sufficient contingency measures, and that tasks will be delegated fairly
We expect each group to have nominated a leader and held their first meeting(s) by the end of the first teaching
week. A deputy leader is also required, who will assume the responsibilities of the team leader in a back-up
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 5
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
Lectures
Group Allocation
Reading Papers
Project Theme Selection
Three Paper Reviews
Threat Model
Security Policy
Assessment 1 Submission
High & Low Level Design
Coding & Implementation
Testing & Evaluation
Assessment 2 Submission
Weeks 1 to 4
Week 1
Weeks 2-3
Weeks 3-4
4th March
Weeks 4-6
22nd March
Weeks 1-4
Weeks 4-6
Figure 1: Indicative module flowchart.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 6
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
capacity. The names of team leaders and deputy leaders should be submitted in your Microsoft Teams channel
by Week 2.
Submit progress update each week covering minutes of the team meeting and any concerns.
4.2 Project Supervision
As mentioned in Section 1, teams are expected to work independently with minimal supervision, similar to
the way in which your individual project (dissertation) supervisor may operate. However, you are not alone:
problems sometimes arise that prevent teams from functioning as expected. There are several ways in which
such issues can and should be raised. Firstly, it is critical that you make the most of the aforementioned tutorial
sessions. Please do not hesitate in raising queries/issues with the module staff during the scheduled tutorial
sessions. Within the short duration of the module, unresolved issues can quickly spiral into ones that affect
your grades. The Canvas discussion board functionality also serves as an appropriate forum for raising issues.
Lastly, if all other avenues of communication have failed, the module staff can be contacted via email.
4.3 Individual Contribution Formula
It is important in team-based modules to ensure that each member’s contributions are fairly reflected in the
overall marks. This must be done in a way that incentivises teamwork and collaboration, avoiding situations
in which one or two people do all of the work. This module uses the following guidance, which has been used
in previous years on CSC8208 and its sister module, CSC8113: “Group contributions should be agreed among the
group, and should be fair and truthful. They should sum to 100% and must be included in the group report.”
In other words, if a group has eight members, then an ‘ideal’ allocation is 12.5% per person to indicate that
everyone has contributed equally. However, it need not be ideal due to the different levels of engagement
between team members. A possible distribution could be 15%, 15%, 15%, 15%, 15%, 10%, 5%, and 10%.
In your decision-making process, please consider the significance of individual contributions. If the final
project report carries a weight of 70% of the overall module marks, and a group mark is given as 80/100, then
the report will carry 56/70 (= 70 × 0.8) towards the group’s mark.
Given eight members in a group, there are (56 × 8) = 448 marks to be distributed. Let us also assume each
member is named as A, B, C etc. Given an example of A = 15%, B = 15%, C = 15%, D = 15%, E = 15%,
F = 10%, G = 5%, and H = 10%, then the following allocation will be made for individual grades:
• A, B, C, D, and E will receive 15% of 448 = 67.2/70 = 96%.
• F and H receive 10% of 448 = 44.8/70 = 64%.
• G receives 5% of 448 = 22.4/70 = 32%.
Therefore, G will receive a failing grade for this assessment.
Considering that 100% is the maximum that a student can achieve, this methodology has some significant
consequences. Let’s assume the same situation in which the group has received 56/70 for their final report:
• Assume that four members, A, B, C and D, do all of the work, and their contributions are 25% each with
all other team members having zero contribution. In this scenario, A . . . D will thus receive 0.25 × 448 =
112/70 = 160%, while E . . . H will receive 0%. Because the assessment is ‘capped’ at 100% per individual,
A . . . D will receive 100% in practice; the additional amounts over 100% are lost.
• Freeloading on others’ contributions is penalised. Assume A . . . G contribute 14% each, while H contributes 2%. H will receive a failing grade in their individual mark (0.02 × 448 = 8.96/70 = 12.8%) while
A . . . G receive 0.14 × 448 = 62.72/70 = 89.6%.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 7
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
5 Marking Criteria
5.1 Literature Review, Threat Model, and Security Policy
This assessment aims to develop critical analysis and understanding of key research papers within the realm
of security, specifically focusing on subject areas such as privacy, performance, networking and blockchain.
Students are tasked with reviewing any three research papers from a pre-determined list of scholarly articles
provided by the module staff.
Along with the research paper reviews, students are required to submit a threat model and a security policy aligned with their chosen theme and research papers. The security policy should encompass preventive
measures, detection strategies and measures to maintain the security properties outlined in the threat model.
The mark scheme for this assessment is given in Table 1 at the end of this document.
5.2 Final Project Report
The final project report attracts the biggest percentage of any assessment (70%). It should describe your solution in the style of a scientific paper (IEEE Computer Society double-column journal or conference style). This
should give you a feel for how ‘real’ papers in computer science are composed. The template can be found
online or on Canvas.
The precise section headings are left for you to decide. However, in general, we expect that a good report
would comprise the following:
• The project’s aim, rationale and objectives, and a brief background of the research problem(s) that you
are solving.
• A literature review in the form of a ‘Related Work’ section written specifically on secure chat systems.
• How your system design and implementation addresses each of the three aforementioned dimensions:
1 security, 2 resilience, and 3 research novelty, as described in §3.2.
• How you evaluated your project.
• Your conclusion(s) and any directions for future research.
To guide the development of your project, the final report will be marked using the criteria in Table 2 at the
end of this document. This should set out the expectations for receiving the different grades. Good luck!
6 Helpful Advice
Some common issues have arisen in the past that have limited the success of teams’ assessments in this module.
These issues are described below in order to help you avoid them:
• Structure and focus your team appropriately. It makes little sense for every team member to be on
programming duties with nobody, for example, working on security engineering or research novelty. It
is generally a sound strategy is to focus efforts evenly, structuring the team to meet all elements of the
marking criteria. For example, you may wish to assign a resilience ‘lead’ to to one team member, security
to another, and so on. This will help balance your team while leveraging the strengths of each member.
• ‘Don’t roll your own crypto’. During the design and implementation of your project, it is important to
use established, rigorously tested security algorithms. Implementing protocols, or worse, cryptographic
algorithms from first principles is not necessary to be successful in this module. Always opt for an
existing libraries and protocol implementations over ones you build yourselves.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 8
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024
• Make use of communication and collaboration tools. Working effectively in a team is essential to succeeding in this module. It is strongly advised to arrange frequent in-person or virtual meetings to help
make key decisions, delegate tasks etc. You may also wish to use Microsoft Teams, Slack, Discord, or
another platform to help coordinate your activities online. Github and other Git implementations are
also useful in managing code bases that involve a number of contributors.
7 Supplemental Background Reading
This module accepts students from a wide range of backgrounds and programmes. Some team members may
have a limited understanding of security, while others, such as those on the M.Sc. Cyber Security programme,
may have a large degree of knowledge. However, other members will have skills in other important areas,
such as cloud computing, which lends itself to the resilience dimension. It is vital that teams work effectively
to maximise the benefits of each other’s skill sets.
It is often desirable for everyone to have a broad understanding of what they are implementing. The following
resources are suggested as a introductory reference material. Note: these should be considered independently to the
papers that you include in your literature review!
• On research methods in computer science: J. Zobel, “Writing for Computer Science.” Springer, 2009 [2].
• On threat modelling: A. Shostack, “Threat modeling: Designing for security.” John Wiley & Sons, 2014 [3].
Chapters 1–3 are worth consulting for modelling threats in a standard fashion.
• On security and cryptographic engineering: N. Ferguson, B. Schneier, and T. Kohno, “Cryptography
engineering: Design principles and practical applications.” John Wiley & Sons, 2011 [4]. Chapters 1–2 and
18–20 may be of interest.
• Building modern resilient systems: H. Adkins et al., “Building secure and reliable systems: Best practices for
designing, implementing, and maintaining systems.” O’Reilly Media, 2020 [5]. See chapters 1–2 and 8–10.
Acknowledgements
A ‘thank you’ is due to the previous staff, particularly Dr. Steve Riddle, who helped make CSC8208 a success
in previous years. Also, thanks to Dr. Essam Ghadafi for permission to use the CSC8209 marking criteria from
which the final report’s mark scheme is derived.
References
[1] N. Borisov, I. Goldberg, and E. Brewer, “Off-the-record communication, or, why not to use PGP,” in Proceedings of the ACM Workshop on Privacy in the Electronic Society, pp. 77–84, 2004.
[2] J. Zobel, Writing for computer science. Springer, 3 ed., 2014.
[3] A. Shostack, Threat modeling: Designing for security. John Wiley & Sons, 2014.
[4] N. Ferguson, B. Schneier, and T. Kohno, Cryptography engineering: design principles and practical applications.
John Wiley & Sons, 2011.
[5] H. Adkins, B. Beyer, P. Blankinship, P. Lewandowski, A. Oprea, and A. Stubblefield, Building secure and
reliable systems: best practices for designing, implementing, and maintaining systems. O’Reilly Media, 2020.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 9
CSC8208 MODULE
HANDBOOK
(
V1.2) ACADEMIC
YEAR: 2023/2024
Appendix
Assessment 1 Criteria
We maintain a broadly flexible marking scheme for assessment one (30% of the overall module grade). The first element of the report—the paper summaries—
will be marked with respect to the components in Table 1. This will attract 20% of the overall module grade; each paper summary will carry 1/3 of this grade.
Table 1: Assessment 1 – Marking criteria breakdown.
Aspect Contribution (%) Description
Investigation methodology 30 Does the paper aim to answer any questions? What are these? If not, what do you think these
questions are? Why are these questions interesting to the general reader (not just yourself) How
does the paper answer these questions?
Critical evaluation 50 Provide a critical commentary on the work itself, focusing on the strengths and weaknesses. In
particular, the strengths of the work should demonstrate your understanding on the paper itself
and its merits. You should not justify your commentary based on the print-quality or formatting
of the work.
Open challenges and discussion 20 Write a discussion note about the paper itself, by presenting a list of topics or questions about the
paper, for the reader to consider. These should not be questions the paper has already asked, or
those you have written previously.
The remaining 10% is divided as follows:
• Threat model (5%): Give a succinct description of the attackers and attack methods with suitable justification (1/2 page).2
• Security policy (5%): Give a concise set of rules (bullet points) which can serve as the security requirements that if met, will successfully protect against
attackers (1 page).
2For the utmost clarity, the threat model and security policy should be written specifically with respect to your secure chat project, not the paper summaries.
NEWCASTLE
UNIVERSITY Last modified: March 1, 2024 10
CSC8208 MODULE HANDBOOK (V1.2) ACADEMIC YEAR: 2023/2024 Assessment 2 Criteria This assessment attracts 70% of the module. The mark scheme in Table 2 will be used. Table 2: Assessment 2 – Mark scheme. Component (%) Fail (0–39%) Borderline (40–49%) Pass (50–59%) Merit (60–69%) Distinction (70–100%) Introduction (10%) Irrelevant rationale, aims, objectives, or problems to be addressed. A present but unclear rationale; objectives are largely vague in scope. A clear aim and mostly realistic objectives; may be vague in places. Clear aim with specific, realistic, measurable ob- jectives; good rationale. Cogent, research-based aim and SMART objec- tives; excellent rationale. Background (15%) An absent or irrelevant consideration of related work; no connection to the aim and objectives. Limited coverage of es- sential literature; many relevant papers not in- cluded; vaguely relevant to the aim and objectives. Basic coverage of related literature; some relevant papers not included; a weak but clear link to the aim and objectives. Good coverage of related work, but largely de- scriptive or uncritically treated; a good link to aims and objectives State-of-the-art literature covered, understood, and critically reviewed; clear and compelling links to the aim and objectives. Security (15%) Solution mostly fails to meet any ‘must have’ se- curity requirement. Lim- ited awareness of relevant threats and mitigations. Vaguely addresses some ‘must have’ security re- quirement; largely flawed mitigations. Addresses the key secu- rity requirements; mitiga- tions may have shortcom- ings; sound threat model and security policy. Addresses the key secu- rity requirements; appro- priate and correctly im- plemented mitigations. Addresses key and 1+ other security require- ments; strong threat model, security policy; appropriate mitigations. Resilience (15%) Solution does not enable one-to-one communica- tion; not resilient under any scenario. Enables two-party com- munication at any one time; major issues under most realistic scenarios. Multiple simultaneous sessions; implements a stated resilience mecha- nism; may have issues under some scenarios. See ‘pass’ but with a compelling implementa- tion showing resilience under realistic scenarios. A compelling solution with multiple resilience mechanisms catering to realistic scenarios. Innovation (15%) No potential for innova- tion; badly executed ver- sion of a simple system. A working derivative of existing work; no mate- rial novelty. Some novelty, but minor or incremental in nature. Significant novelty; largely safe, conventional approach to a reasonable problem. Significant novelty; con- vincingly addresses a rea- sonable problem in an original, inventive way. Evaluation (15%) An irrelevant or missing evaluation. Limited justification of the project’s aims and objectives. No empirical evidence. Acceptable justification; empirical methods used to justify the project’s aims and objectives. Empirically-led eval- uation; may not meet real-world requirements. Convincing, empirically- led evaluation demon- strated under real-world requirements. Form (5%) Incoherent structure; ma- jor typographical issues; no listings or diagrams. Many typographical is- sues; poor structure, ref- erencing; poor use of list- ings and diagrams. Generally coherent; some typographical, referenc- ing issues; acceptable use of listings and diagrams. Easy to follow; only mi- nor presentation and ref- erencing issues; good use of listings and diagrams. Commensurate with a quality publication with very minor changes. Presentation (10%) Fails to demonstrate most project elements (motiva- tion, design, implemen- tation, evaluation, outcomes etc.). Covers most basic ele- ments of the project, but lacks significant depth and clarity; poor visual appeal. Covers all basic elements; lacks detail, visual ap- peal, or coherence in some places. Good structure, clearly communicates the main elements of the project in an appealing way; some level of critical analysis. Excellent structure, visual appeal, offering in-depth, insightful, critical analy- sis of the project.
NEWCASTLE UNIVERSITY Last modified: March 1, 2024 11
請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標(biāo)簽:

掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
  • 上一篇:代做EL2106  、代寫(xiě)Signals and Systems    
  • 下一篇:代寫(xiě) CSSE7030 Connect 4
  • 無(wú)相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲(chóng)
    油炸竹蟲(chóng)
    酸筍煮魚(yú)(雞)
    酸筍煮魚(yú)(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚(yú)
    香茅草烤魚(yú)
    檸檬烤魚(yú)
    檸檬烤魚(yú)
    昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
    昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • NBA直播 短信驗(yàn)證碼平臺(tái) 幣安官網(wǎng)下載 歐冠直播 WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    主站蜘蛛池模板: 日韩三级网 | 一本到免费视频 | 亚洲国产成人aⅴ毛片大全密桃 | 黄色三级网站在线观看 | 午夜视频国产 | 午夜91 | 一区二区视频在线观看 | 伊伊成人网| 小视频免费在线观看 | 欧美三级欧美成人高清 | 亚洲人成在线观看 | 中文字幕黑人 | 超碰免费视| 亚欧洲精品在线视频免费观看 | 亚洲综合播放 | 女人叫床很黄很污句子 | 一级黄色录像大片 | 欧美成人午夜 | 九一国产在线 | 欧美激情亚洲 | 成人午夜av | 69视频在线播放 | 日韩另类视频 | 中文字幕乱码日产无人区 | 中文字幕在线视频免费观看 | 黄色av免费 | 久久精品123 | 国产欧美在线免费观看 | 丰满岳妇乱一区二区三区 | 日本欧美一级 | 7777av| 亚洲高清视频在线观看 | 中文字幕在线网 | 国产精品三级久久久久三级 | 日韩视频欧美视频 | 国产麻豆一区 | 欧美一二三区视频 | 五月色婷婷综合 | 中文天堂在线观看 | www.久久久.com | 91精品国产麻豆国产自产在线 | 武打黄色片 | 亚洲女人天堂 | 高清在线一区二区 | 亚洲视频欧美视频 | 亚洲欧美另类一区 | 国产一级片在线播放 | 国产在线视频在线观看 | av的天堂 | 日韩精品一二三四区 | 久久黄视频 | 特级西西444www大精品视频 | 亚洲成人入口 | 久久cao| 欧美一级一区 | 你懂的网站在线 | 亚洲激情国产 | 久久麻豆av | 成人午夜视频免费 | 精品无人国产偷自产在线 | 高清免费av| 亚洲第二页 | 亚洲最大福利网 | 在线欧美日韩 | 天天射天天干天天操 | 激情久久av一区av二区av三区 | 国产超碰人人模人人爽人人添 | 狠狠躁18三区二区一区传媒剧情 | 亚洲区一区 | 亚洲欧洲日韩在线 | 在线se| 国产白丝av | 欧美日本高清 | 国产又粗又黄又爽又硬 | 国产精品女主播 | 亚洲作爱网 | 国产精品久久午夜夜伦鲁鲁 | 国产999| 一区二区91 | 亚洲产国偷v产偷v自拍涩爱 | 欧美视频黄色 | 视频福利在线 | 欧美性猛交99久久久久99按摩 | 一级片aaa | 国产人伦精品一区二区三区 | 国产日产亚洲精品 | 天堂在线视频 | 亚洲精品国产福利 | 欧美三日本三级少妇三99 | 自拍偷拍精品 | 日韩成人高清视频 | 毛片在线网站 | 一级国产精品一级国产精品片 | 天堂成人在线观看 | 欧美日韩精品久久久 | 国产a毛片 | 呦呦色 | 精品成人av | 婷婷激情五月 | 超碰天天干 | 亚洲黄业| 国产精品人人爽人人爽av | 国产免费av一区二区三区 | 午夜在线网站 | 丁香花完整视频在线观看 | 久久久国产精品人人片 | 国产小视频在线观看 | 在线永久免费观看 | 免费一级特黄特色大片 | 欧美亚洲第一区 | 日韩欧美一 | 亚洲精品资源在线 | 日日噜噜噜夜夜爽爽狠狠视频97 | 好男人www免费高清视频在线观看 | 国产精品av在线 | 国产在线日韩 | 国产一区二区三区在线 | 色婷婷丁香 | 欧美在线专区 | 99爱在线 | 欧美裸体女人 | 成年人性生活免费视频 | 久久精品国产亚洲7777 | 免费中文字幕 | 国产视频91在线 | 在线观看中文字幕码 | 国产精品毛片久久 | 国产精品久久久久久久久久免费看 | 极品美女开粉嫩精品 | 中出在线播放 | a黄色片| 日韩在线一区二区 | 亚洲精选久久久 | 小色瓷导航 | 五月天中文字幕mv在线 | 超碰在| 亚洲福利视频一区二区 | 福利视频在线免费观看 | 中文字幕日韩在线视频 | 精品少妇一区二区三区免费观看 | 国产日韩欧美自拍 | 日韩成人福利 | 男女免费视频 | 一本色道久久综合亚洲精品按摩 | 青草伊人网 | 国产对白叫床清晰在线播放 | 伊人影院在线视频 | 91嫩草入口 | 国产精品2019 | 国产干干 | 中国黄色三级视频 | 亚洲成人久久久 | 肉色欧美久久久久久久免费看 | 久久精品久久久久久久久久久久久 | 日韩一区二区三免费高清在线观看 | 欧美一级特黄视频 | 国产亚洲精品久久777777 | 亚洲人成小说 | 国产成人精品三级麻豆 | 天天舔天天爱 | 中国一级片黄色一级片黄 | 91精品国产综合久久香蕉的特点 | 婷婷天堂 | 成人免费视频视频 | 手机免费看av片 | 在线观看亚洲黄色 | 奇米激情 | 四虎永久在线精品免费一区二区 | 自拍偷拍18p| 国产超碰人人做人人爽 | 最近最经典中文mv字幕 | 亚洲一一在线 | 日韩中文字幕免费观看 | 亚洲国产欧美在线 | 国产精品视频免费在线观看 | 日韩精品视频在线 | 国产精品一二三区视频 | 天天爽夜夜操 | 国产欧美精品一区二区色综合朱莉 | 伊人久久伊人 | 亚洲欧美精品在线 | 欧美日韩国 | 久久91久久久久麻豆精品 | 日本爽爽爽 | 亚洲成人精品一区 | www.久久久久久久久 | 国产精品一区二区三区四区五区 | 久久麻豆av| 在线国产一区二区三区 | 国产系列在线观看 | 春闺艳妇(h)高h产乳 | 中文字幕+乱码+中文字幕明步 | 毛片一级片 | 亚洲精品综合网 | 亚洲永久免费在线观看 | 亚洲视频一区二区在线观看 | 国产精品久久久久久久久动漫 | 99热这里有| 日韩精品久久久久久久酒店 | 亚洲天堂黄色 | 国产视频污 | 国产精品三级视频 | 一级片视频在线 | 最色毛片 | 欧美日韩一 | 国产高清sp| 婷婷激情综合 | 成人免费公开视频 | 亚洲精品在线观看免费 | 神马久久久久久久久 | 国产又黄又粗又猛又爽 | 国产激情无套内精对白视频 | 欧美xxxxhd| 九九视频在线免费观看 | 亚洲区视频在线观看 | 欧美视频一区在线观看 | 日韩三级不卡 | 久久久国产成人一区二区三区 | 青草视频在线 | 日本天堂在线视频 | 一本大道久久精品懂色aⅴ 久久久久久亚洲欧洲 | 好吊妞视频一区二区三区 | 亚洲成人精品网 | 日韩国产欧美精品 | 日本欧美在线 | 欧美精品乱码久久久久久按摩 | 成年人深夜福利 | 做爰视频毛片视频 | 欧美综合一区 | 天堂在线播放 | a√国产 | 国产一区二区在线视频 | 国产成人av免费看 | 日韩一区二区三区av | 欧美福利视频在线 | 欧美在线观看视频 | 黄色大片网 | 伊人影院在线观看视频 | 久久99精品久久久水蜜桃 | 国产一区视频在线播放 | 在线亚洲自拍 | 欧美日韩精品区 | 国产a级黄色 | 日韩在线视频第一页 | 1024欧美| 亚洲黄av| 久久蜜桃香蕉精品一区二区三区 | 国产不卡av在线 | 就去吻亚洲 | 国产精品av一区 | 国产老头户外野战xxxxx | 久久中文字幕一区 | 伊人久久超碰 | 国产寡妇亲子伦一区二区三区四区 | 免费a在线观看播放 | 99久久久久成人国产免费 | 国产一区二区三区四区在线观看 | 日本成人在线网站 | 4438亚洲最大 | 激情伊人 | 99久久夜色精品国产亚洲 | 亚洲无马砖区2021 | www.在线观看视频 | 99久久免费毛片基地 | 国产三区在线成人av | 久久久久久国产精品 | 亚洲精品久久区二区三区蜜桃臀 | 国产精品1234区 | 91精品国产乱码久久久张津瑜 | 最近更新中文字幕第一页 | 欧美黄色短片 | 欧美一区二区成人 | 久草小说 | 亚洲一卡二卡 | a级片在线免费观看 | 亚洲综人 | 欧美成人精精品一区二区频 | 在线日韩精品在线 | 五月婷婷俺也去 | av首页在线 | 伊人久久一区二区 | 国产欧精精久久久久久久 | 日韩视频一区 | 国产精品成人久久久久 | 四虎在线观看视频 | 午夜精品久久久久久久91蜜桃 | 天天干天天插 | 裸体男女树林做爰 | 欧美大片免费看 | 国产精品一二三区成毛片视频 | 亚洲一区二区免费看 | 91网址在线 | 欧美日韩国产在线 | 五十路av| 91国产一区二区 | 国产精品久久久久久久久动漫 | 九色影院 | 日本精品网站 | 日本超碰在线 | 夜夜欢视频 | 国产三级精品在线 | 国产在线观看黄色 | 欧美三日本三级少妇99 | 国产精品乱码一区二区三区 | av首页在线 | 欧美 亚洲 另类 激情 另类 | 亚洲精品国产精品国自产观看浪潮 | 亚洲欧美偷拍一区 | 大地av | 五月婷婷,六月丁香 | 天堂成人在线观看 | 999亚洲欲妇 | 日韩av中文字幕在线播放 | aaa在线播放 | 性欧美13一14内谢 | 国产特黄大片aaaa毛片 | 黄色av网站在线观看 | 伊人免费视频 | 亚洲国产影院 | 91国内在线| 性插视频在线观看 | 精品美女一区二区三区 | 91大神视频在线播放 | 欲色影音| 激情欧美一区二区 | 79日本xxxxxxxxx18 成人免费视频播放 | 99精品一区二区三区 | 性生活视频在线播放 | 九色视频丨porny丨丝袜 | 日韩欧美三级在线 | www.97色| 成人吃奶视频 | 伊人网综合在线 | 最新中文字幕在线视频 | 又大又长粗又爽又黄少妇毛片 | 日本午夜网站 | 久久r热视频| 妖精视频污 | 成人公开免费视频 | 国产福利av | 欧美一区三区 | 伊人春色网 | 九九热精品在线观看 | 中国男女全黄大片 | 在线黄色av | 凹凸日日摸日日碰夜夜 | 日韩精品一二三四区 | 中文字幕高清视频 | 天堂在线视频tv | 国产视频在线观看一区 | 国产一区二区在线播放视频 | 夜夜操夜夜 | 国产喷水吹潮视频www | 亚洲精品久久久久中文字幕m男 | 开心激情网五月天 | 国产经典一区 | 神马午夜久久 | 亚洲成av人片一区二区梦乃 | 美女国产网站 | 色婷婷av久久久久久久 | a天堂中文 | 亚洲欧美日韩影院 | 欧美偷拍视频 | 一区二区不卡视频在线观看 | 91中文字幕| 奇米网久久| 日产精品久久久久久久 | 一级片欧美 | 91久久捆绑调教美女 | 中文字幕一区二区三区在线播放 | 国产婷婷色一区二区三区在线 | 四虎国产在线 | 最新av在线 | 九色综合网 | 美日韩一级| 欧美日韩在线视频播放 | 色哟哟日韩精品 | 久一久久 | 黄色伊人网 | 亚洲天堂影院 | 一级国产精品一级国产精品片 | 欧美成人免费在线 | 精品日韩一区二区 | 国产精品视频一区二区三区四区国 | 成人av夸克网址 | 起碰在线 | 精品国产乱 | 韩日av片| 亚洲国产精品久久久久久6q | 亚洲女人天堂成人av在线 | 伦理片波多野结衣 | 中文字幕亚洲一区二区三区五十路 | 宅男午夜看片 | 中文字幕不卡免费视频 | 亚洲网色 | 国产精选久久久 | 一区一区三区产品乱码 | 亚洲欧美日本国产 | av在线官网| 狠狠干av | 日本精品视频在线 | 欧美成人r级一区二区三区 亚洲精品综合久久 | 91大神视频在线播放 | 日韩黄色一级视频 | 在线天堂av | 午夜性福利 | 看毛片的网址 | 亚洲精品乱码久久久久久久 | 制服丝袜第一页在线观看 | 天堂资源网 | 99热超碰在线 | 91久久爽久久爽爽久久片 | 青青草原在线免费观看视频 | www天天操| 欧美黄色性视频 | 国产精品99久久久久久人免费 | 婷婷影视 | 国产免费三片 | 亚洲无吗在线观看 | 日本高清www免费视频 | 经典一区二区三区 | 国产黄色三级 | 国产片网站 | 一本色道久久88综合日韩精品 | 欧美a在线观看 | 亚洲天堂aaa | 日本高清不卡二区 | 69pao| 夜夜嗨av一区二区三区四季av | 国产一级一区二区 | 中文永久免费观看 | 成人在线免费看视频 | 欧美激情成人 | 国产精品20p| 国产在线第二页 | 成人网在线看 | 在线免费黄| www.国产com | 国产免费一区 | 日韩午夜伦 | 日韩免费在线观看 | 久久久久国产精品一区二区 | 一级全黄裸体片 | 日韩中文字幕在线看 | 亚洲揄拍窥拍久久国产自揄拍 | 亚洲一区观看 | 成人做爰www免费看视频网站 | 懂色av蜜臀av粉嫩av分享吧 | 涩婷婷| 91麻豆免费视频 | 黄色成人免费网站 | 中文在线免费看视频 | 欧美日韩久久 | 天天操,夜夜操 | 久久国产精品波多野结衣 | 日韩欧美在线免费 | 婷婷在线观看视频 | 国产特级黄色录像 | 亚洲精品字幕在线观看 | 色花av | 在线免费观看a视频 | 亚洲91影院 | 天天想夜夜操 | 91视频一区二区 | 男女视频免费看 | 蜜桃久久久久久久 | 国产五十路 | 葵司在线视频 | 色婷婷视频在线观看 | 免费av软件| 国产在线综合网 | 中文字幕一区二区三区精华液 | 午夜精品久久久久久 | 国产露脸8mav | 免费在线观看黄色av | 一道本毛片 | 91亚色在线观看 | 伊人久久伊人 | 亚洲91视频 | 精品日本视频 | jzzijzzij亚洲成熟少妇 | 精品久久久久久久久久岛国gif | va在线观看 | 日韩欧美国产亚洲 | 97在线观视频免费观看 | 精品国产一区在线观看 | 欧美在线视频播放 | 成年人免费高清视频 | 免费黄色成人 | 国产自产视频 | 日本3p视频 | 特级丰满少妇一级aaaa爱毛片 | 99一级片 | 91成人在线网站 | 天堂网中文字幕 | 久草免费在线色站 | 国产区在线 | 欧美资源在线观看 | 97午夜 | 蜜桃久久久久久久 | 黄色男女网站 | 亚洲视频在线一区 | 国产一区a | 99毛片| 一区二区久久久久 | a在线观看免费 | 欧美成人h版 | 成人无遮挡黄漫yy动漫免费 | 国产亚洲区| 女同爱爱视频 | 91视频色版| 日韩国产欧美一区二区 | 天天操人人干 | 国产深夜视频 | 刘亦菲久久免费一区二区 | 最新中文字幕在线观看视频 | 干成人网| 国产日韩精品一区二区三区 | 11孩岁女毛片 | 精品久久中文 | 天天躁日日躁aaaaxxxx | 亚洲a在线视频 | 日韩在线视频播放 | 第一毛片| 亚洲人人干| 浪漫樱花在线观看高清动漫 | 久久综合欧美 | 国产精品国产精品 | 久久久亚洲国产 | 一区二区视频在线 | 色噜av| 亚洲91色 | 日韩av午夜 | 亚洲精品传媒 | 午夜影院福利视频 | 深夜av在线 | www.国产高清 | 成人欧美一区二区三区在线播放 | 色综合社区 | 亚洲精品午夜精品 | 手机看片日韩久久 | 欧美黄在线观看 | 少妇激情网 | 伊人热久久| 久草中文在线 | 黄色网址中文字幕 | 操一操| 伊人久久在线 | 人人爽人人做 | 天天草天天干 | 成人免费一级片 | 日日射日日操 | 中文字幕精品三区 | 日韩操操 | av观看网站 | 欧美成人精精品一区二区频 | 337p日本大胆噜噜噜鲁 | 国产男女猛烈无遮挡免费观看网站 | 成人午夜视频免费 | 黄色三级三级三级三级 | 夜夜欢影院 | 懂色av一区二区三区在线播放 | 亚洲欧洲精品在线 | 成人午夜激情 | 九九精品在线播放 | 91网站在线免费观看 | 天天做天天爱夜夜爽 | 日韩欧美一二三区 | 亚洲视频123 | jlzzjizz在线播放观看 | 色一情一区二 | 欧美日韩精品久久久 | 天堂影院av| 好吊妞一区二区 | 欧美 亚洲 | 国产剧情av在线 | 日韩午夜三级 | 久久久精品一区二区三区 | 日韩一区二区三区四区五区六区 | 亚洲天堂久久久 | 免费毛片a| 成人免费视频网站在线观看 | 91黄视频在线观看 | 亚洲精品国产精品国自产观看浪潮 | 日本在线观看网站 | 曰女同女同中文字幕 | 亚洲欧美综合另类自拍 | 欧美 日韩 国产 一区 | 一级片一级片一级片一级片 | 国产永久在线 | 国产日本免费 | 天天艹夜夜 | 久久久久久国产精品免费免费 | 毛片毛片毛片毛片毛片毛片毛片毛片 | 二区影院| www.污视频| 志在出位国语完整在线观看 | 91婷婷射 | 成人深夜在线观看 | 国产黑丝在线观看 | 在线观看免费视频a | 天天躁夜夜操 | 一区二区激情视频 | 超碰人人cao| 国产一级片网站 | 日韩久久久久久久 | 伊人影院在线播放 | 美女久久 | 中文字幕在线字幕中文 | 欧美精品免费一区二区三区 | 日韩精品www | 欧美精产国品一二三区 | 成人一二区 | 色综合社区 | 亚洲视频一区在线播放 | 一级大黄色片 | 天堂在线一区 | 中文字幕乱码中文字幕 | 爱爱爱网| 亚洲国产精品成人综合久久久久久久 | 亚洲一区二区三区加勒比 | 日韩毛片在线免费观看 | 日本超碰| 中文字幕日韩一区 | 欧美日本黄色 | 久久网页| 永久毛片 | 国产精品精品 | 久久99热精品 | 国产伦精品视频一区二区三区 | 五月天综合网 | 欧美五月婷婷 | 欧美 日韩 国产 一区 | 亚洲专区在线播放 | 国产三级视频 | 亚洲精品福利网站 | 久久国产精品99久久人人澡 | 五月婷婷丁香在线 | www,久久久| 99re久久 | 又紧又大又爽精品一区二区 | 亚洲国产日韩精品 | 免费色视频 | 91免费在线看 | 亚洲第一伊人 | 欧美xxxxhd| 午夜一级黄色大片 | 五月综合激情网 | 色婷婷六月天 | 成人在线免费观看视频 | 综合久久影院 | 另类天堂网 | 黄色片在线播放 | www.色人阁| 91精品国产综合久久香蕉 | 久草视频在线资源站 | 激情综合文学 | 亚洲一区在线看 | 久久久久久黄 | 国产性猛交96 | 小早川怜子久久精品中文字幕 | 中文字幕狠狠干 | 顶级毛片| 国产欧美a | 亚洲人成人毛片无遮挡 | 欧美一级三级 | 亚洲一级淫片 | 亚洲成人99 | 天天射视频 | 涩涩视频软件 | 韩国黄色精品 | 拍真实国产伦偷精品 | 久色视频在线 | 欧美激情综合色综合啪啪五月 | 香蕉网在线 | 97视频在线免费观看 | 殴美一区二区 | 国产精品美女啪啪 | 男女午夜免费视频 | 欧美成人久久 | 欧美大片黄色 | 精品久久久久久久久久久久久久久久久 | 午夜视频www | 亚洲麻豆视频 | 成年人黄色片 | 日本色网址 | 亚洲美女网站在线观看 | 综合激情av| 欧美精品一二三四区 | 一区二区三区少妇 | 国产寡妇亲子伦一区二区三区四区 | 中国二级毛片 | 国产一级aa大片毛片 | 中文字幕在线1 | 中文字幕一区三区久久女搜查官 | 都市激情校园春色亚洲 | 性生生活大片又黄又 | 伊伊综合网 | 亚洲永久免费在线观看 | 天天操夜夜欢 | 国产精品成人av久久 | 操网 | 在线免费看黄视频 | a级片毛片 | 日本不卡一 | 外国黄色网 | 草草视频在线播放 | 一区二区三区国产视频 | 欧美日本在线视频 | 免费观看av毛片 | 国产免费一区二区三区最新不卡 | www色网 | 国产精品超碰 | 久久蜜臀 | 久久亚洲一区 | 午夜两性网| 日本综合久久 | 在线精品视频播放 | 最新成人 | 中文字幕第一页在线 | 国产成人毛片 | 狼色网| 精品视频在线观看免费 | 欧美,日韩,国产精品免费观看 | 中文字幕第九页 | 天堂网成人| 天天躁日日躁狠狠很躁 | 伊人91| 日日摸夜夜爽 | 国产精品久久久久久欧美2021 | 西厢记在线观看 | 老司机av网站| 国产黄a三级三级三级 | 精品视频一区二区三区在线观看 | 精品国产不卡一区二区三区 | 波多野结衣精品 | 色哟哟国产精品色哟哟 | 亚洲激情网站 | 蜜桃一区二区 | 国产77777 | 日日操夜夜骑 | 香蕉网在线观看 | 综合中文字幕 | 天堂成人 | 国产污在线观看 | 黄色片网站免费在线观看 | 亚洲一二三区视频 | 中文字幕一二区 | avwww.| 日韩av在线网 | 奇米第四色首页 | 日韩成人在线观看视频 | 免费黄色小视频在线观看 | 久久99精品国产麻豆91樱花 | 久久久久网站 | 北条麻妃一二三区 | 欧美一级射 | 欧美精品乱码久久久久久按摩 | 中文字幕资源在线 | 日本精品一二三区 | 国产福利在线免费观看 | 久久密av | 欧美乱大交xxxxx | 天堂俺去俺来也www久久婷婷 | 久久久久极品 | 亚洲美女av在线 | 99久久这里只有精品 | 日日爽爽 | 欧美午夜精品 | 高潮毛片 | 99视频网站| 插插看看 | 在线观看福利片 | 波多野一区二区 | 黑人一级黄色片 | 在线看mv的网址入口 | 亚洲最大色网站 | 少妇高潮露脸国语对白 | 久久久午夜视频 | 97干视频 | 成人久久国产 | 亚洲大胆人体视频 | 亚洲素人 | 久综合| 超碰在线97观看 | 亚洲视频第一页 | 一本色道久久综合亚洲精品按摩 | 亚洲精品一线二线三线 | 国产精品久久久久久久久免费高清 | 国产青草视频 | 久久精品久久久精品美女 | 久久r| 天堂在线中文字幕 | 五月婷婷爱 | 精品视频久久久久久久 | 色婷婷av在线 | 91在线观 | 国产第一页屁屁影院 | 精品久久久久久久久久久久 | 欧美成人三区 | 天天操天天爽天天干 | 日韩精品欧美 | 99一级片 | 国产三级网 | 国产三级午夜理伦三级 | 欧美七区 | 成人亚洲综合 | 在线免费看污片 | 国产视频成人 | www.一起操| 亚洲一区欧美 | 亚洲一区精品二人人爽久久 | 国产美女精品一区二区三区 | 国产精品精品久久久久久 | 欧美特级黄色大片 | 一区二区波多野结衣 | 国产又爽又黄免费视频 | 国产免费看黄 | 精久久久 | 奇米在线播放 | 一级黄色免费大片 | 农村黄色片| av噜噜在线 | 男人av资源| 久久久久久久久久久久久久av | 国产欧美精品一区二区色综合朱莉 | 成人黄色在线免费观看 | 高清中文字幕 | 一级在线观看 | 操在线视频 | 成人在线观看免费爱爱 | 一级国产特黄bbbbb | 欧美另类性 | 成人小视频在线免费观看 | www.午夜| 国语自产偷拍精品视频 | 久草资源在线观看 | 91久久国产综合精品女同国语 | 成年人在线网站 | 亚洲免费一级片 | 91久久色| 一级特黄录像免费看 | 中文字幕在线视频播放 | 欧美日韩小视频 | 成人宗合 | 精品国产区 | 91精彩视频| 日韩av在线看| 欧美午夜精品久久久久久浪潮 | 欧美激情在线观看 | 国产又黄视频 | 国产一区二区精品久久 | 在线观看日韩精品 | 午夜伊人网| av地址在线观看 | 四虎成人永久免费视频 | 成人3d动漫在线观看 | 中文字幕一区二区三区四区欧美 | 中文字幕在线免费观看视频 | 四虎三级 | 日本黄色片免费看 | 一区二区麻豆 | 北条麻妃久久 | 久久精品大片 | 国产成人免费av一区二区午夜 | 中文字幕亚洲图片 | 国产成人啪精品 | 在线日韩精品在线 | 亚洲精品久久7777777 | 亚洲综合免费视频 | 在线观看免费视频a | 插插插日日日 | 91片黄在线观看喷潮 | 日韩精品欧美在线 | 五月亚洲 | 精品视频在线免费 | 国产色秀| 97精品一区二区 | 美国做爰xxxⅹ性视频 | 成人免费网站视频 | 黄色片免费播放 | 欧美三级色图 | 天堂网av手机版 | 丁香婷婷激情五月 | 色小姐com| 大香伊人中文字幕精品 | 超碰操 | av不卡免费 | 视频在线观看免费 | 亚洲欧美自拍一区 | 成人精品区 | 亚洲精品字幕在线观看 | 四虎成人影视 | 免费看亚洲 | 激情av在线播放 | 91免费在线| 午夜不卡av免费 | 日韩亚洲在线观看 | 久久久久久婷婷 | 精品国产乱码久久久久久蜜臀网站 | 操操网址 | 国产一区视频观看 | 亚洲黄在线观看 | 一本色道久久加勒比精品 | 看片久久 | 96看片| 一级大片在线观看 | 国产精品56页 | 久草手机在线观看 | 国产中文字幕在线 | 在线免费观看毛片 | 日本精品一二三 | 国产在线你懂得 | 香蕉大人久久国产成人av | 国产自产高清不卡 | 91福利在线视频 | 国产ts变态重口人妖hd | www.四虎.| 久久人人干 | 不卡网av| 91av免费观看 | 男女超碰 | 亚洲成人高清 | 国产在成人精品线拍偷自揄拍 | 成人激情久久 | 日韩在线免费 | 看日本黄色录像 | 一级片一级 | 精产国品一区二区 | 91 久久| 男人插入女人下面视频 | 色大师在线观看 | 欧美另类在线观看 | 成人免费黄色片 | 日韩欧美中文字幕在线观看 | 久久片| 日本在线免费看 | 国产精品成av人在线视午夜片 | 国产精品xxxx喷水欧美 | 日韩色在线 | 亚洲欧美日韩在线一区 | 91丨porny丨在线中文 | 国产在线观看a | 野花社区视频在线观看 | 男人天堂av网站 | 国产精品伦一区二区在线 | 99爱国产 | 免费成人黄色片 | 在线观看av中文字幕 | 在线观看福利片 | 欧美极品jizzhd欧美 | 国产丝袜一区二区三区 | 激情五月婷婷综合 | 蜜桃av免费 | 国产精品一品二区三区的使用体验 | 久久久久久久久97 | 日本一区二区三区四区视频 | 欧美另类v| 婷婷激情五月网 | 人人澡人人插 | 亚洲综合色丁香婷婷六月图片 | 日韩欧美一区二区在线观看 | av中文天堂在线 | 国产午夜麻豆影院在线观看 | 中文字幕性| 久久福利影院 | 国内自拍在线 | 91精品国产综合久久精品图片 | 尤物av在线 | 国产自在线 | 成人午夜激情视频 | av免费大全 | 99性视频| 日韩精品专区 | 国产精品一区二区三区免费视频 | 99久久成人| 性欧美最猛 | 全球av在线 | 中文字幕日韩精品亚洲一区小树林 | 日本特黄成人 | 不卡精品视频 | 4438全国最大成人网 | 小草成人免费视频 | 久久精品伊人 | 久久久久久黄色 | 极品尤物在线观看 | 久久精品一日日躁夜夜躁 | 精品国自产在线观看 | 蜜臀视频在线观看 | 中文无码日韩欧 | 久久免费播放 | 国产精品久久久av | javxxx| 一区二区三区四区欧美 | 96av在线| 色婷网| 韩国三级黄色 | 亚洲人人干 | 啪啪自拍视频 |