Department of Applied Mathematics and Computational Sciences
Syllabi of Five Year Integrated M.Sc Cybersecurity - Regulation 2020
20XC11 CALCULUS AND ITS APPLICATIONS
3 2 0 4
LIMITS AND CONTINUITY: Graphs of standard functions of single variable, Limit, continuity, piecewise continuity, periodic, differentiable, Riemann sum, integrable functions, fundamental theorem of calculus. (10+6)
SEQUENCES & SERIES: Sequences – increasing, decreasing, bounded, function limit properties - Series – convergence and divergence – alternating series test, absolute convergence – ratio test, power series, Taylor series (single variable). (8+6)
FUNCTIONS OF TWO VARIABLES: Models, partial derivative and its geometrical interpretation. Stationary points – maxima and minima- saddle points. Taylor series. Constrained maxima and minima – Lagrange multiplier method. (6+4)
MULTIPLE INTEGRALS: Evaluation of multiple integrals – Cartesian and polar forms, Change of order of integration - Applications of multiple integrals to find area and volume. (9+6)
ORDINARY DIFFERENTIAL EQUATIONS: Linear Differential Equations of first order - Exact differential equations, Integrating factors, Bernoulli equations -Linear Differential Equations of higher order with constant coefficients -Euler's equation with variable coefficients - Simultaneous equations - Method of variation of parameters. Modeling simple systems. (12+8)
Total L:45+T:30=75
TEXT BOOKS:
1. Thomas G B Jr., Maurice D Wier, Joel Hass, Frank R. Giordano, “Thomas’ Calculus”, Pearson Education, 2017.
2. Erwin Kreyszig, “Advanced Engineering Mathematics”, John Wiley, 2014.
REFERENCES:
1. Margaret L Lial, Thomas W. Hungerford and John P. Holcomb, “Mathematics with Applications”, Addison Wesley, 2010.
2. Riley K F, Hobson M P and Bence S J, "Mathematical Methods for Physics and Engineering", Cambridge University Press, 2006.
3. Ray Wyile C and Raymond Wyile C, “Advanced Engineering Mathematics”, McGraw Hill, 2013.
4. Roland E Thomas, Albert J Rosa, “The Analysis and Design of Linear Circuits”, John Wiley, 2009.
5. Michael D Greenberg, “Advanced Engineering Mathematics”, Pearson Education, 2009.
6. Thomas L Harman, James B Dabney and Norman John Richert, “Advanced Engineering Mathematics with MATLAB”, Brooks/Cole, 2000.
20XC12 ENGLISH FOR PROFESSIONAL SKILLS
3 0 0 3
Prerequisites:
COMMUNICATION SKILLS USING SCIENTIFIC TEXTS: Comprehension and critical evaluation of Scientific Essays – Focus on Language Style, Word Formation, Use of Prefixes and Suffixes, Synonyms, Antonyms, Abbreviations and Acronyms and Technical Vocabulary.(6)
FOCUS ON GRAMMAR: Identifying Common Errors In Articles And Prepositions, Common Errors-Misplaced Modifiers-Tenses-Redundancies And Clichés-Practice Exercises In Common Errors. (6)
READING: Reading and Importance-Techniques Of Effective Reading-Improving Comprehension Skills-Techniques For Good Comprehension-Skimming And Scanning-Comprehension-Intensive And Extensive Reading-Practice In Reading Comprehension.(4)
WRITING: Formal Letters-Letter of Complaint, Requisition Letter- Job Application and Resume- Report Writing- Types Of Reports- Business And Technical Reports.(6)
FOCUS ON SOFT SKILLS: Intra & Interpersonal Communication-Interview Techniques-Etiquette-Body Language-Telephone Conversation. (8)
PRACTICALS: Presentations-Group Discussions-Listening Exercises-Mock Interviews. (15)
Total L: 45
TEXT BOOKS:
1. N.P.Sudharshana, C. Savitha “English for Engineers”, Cambridge University Press, 2018.
REFERENCES:
1. Dhanavel, S.P, “English and Soft Skills”, Orient BlackSwan, Hyderabad, 2010.
2. Lina Muhkopadhyay, et al., “English for Jobseekers”, Cambridge University Press, New Delhi, 2013.
20XC13 APPLIED PHYSICS
4 0 0 4
MECHANICS: Displacement. First, second and third order time-derivatives of displacement. Concept of generalised coordinates. Inertial mass, moment of inertia, force, torque. Equilibrium and principle of virtual work. 2D Motion in a gravitational field. Conservative and non-conservative force-fields. Conservation of momentum. Elastic and inelastic collisions. Energy loss and deformation in inelastic collisions. Energy absorbed in material fracture. Applications to packaging, protection and inspection of equipment. (12)
MECHANICAL OSCILLATIONS: Hooke’s law. Characteristics of a spring and damper. Differential equation of a spring, mass and damper system and its solution. Natural frequency. Forced oscillations. Frequency response of the system and resonance. Damping and energy dissipation. Application to vibration control and shock absorbers. Considerations for mechanical isolation of equipment. Magneto-rheological fluids and application to adaptive dampers. (12)
HEAT AND THERMAL CONTROL:Temperature, specific heat-capacity. Temperature and temperature gradient in heat flow. Temperature gradient due to internal and external heat sources. Thermal conductivity. Differential equation of one and two dimensional heat conduction. Boundary conditions and solutions. Thermal insulation. Principles of convective and radiative heat transfer. Heat sinks and heat pipes for heat removal from equipment. Forced air convection. (12)
HYGROMETRY: Air and water-vapour mixtures. Saturation and condensation of moisture from air and its relation to temperature. Dew point. Moisture condensation in electronic equipment and its hazards. Relative humidity. Measurement of relative humidity by dry and wet bulb methods. Humidity sensors and software support for hygrometry. Need for humidity control in installations and equipment. Methods to control humidity. Humidifiers, driers and dessicators. (12)
OPTICS: Light propagation through non-homogeneous refractive media. Fermat’s principle and determination of optical path. Application to light propagation through optical fibres. Numerical aperture. Step-index and graded-index fibres, single mode and multi-mode fibres. Multiplexing and modulation. Bandwidth advantage. Digital optical communication principles. Pulse-broadening in digital communication by optical fibres. Signal degradation due to attenuation and dispersion. Advantages of optical communication. (12)
Total L: 60
TEXT BOOKS:
1. Halliday, David, Robert Resnick, and Jearl Walker. “Fundamentals of Physics”, John Wiley & Sons, 2010
2. Richard. Wolfson. “Essential University Physics with Mastering Physics”, Pearson education Limited, 2015
3. Young, Hugh D., Roger A. Freedman,” University Physics with Modern Physics”, Pearson Education, 2017.
REFERENCES:
1. H C Verma, “Concepts of Physics vol 1 and vol 2”, Bharti Bhawan Publishers, 2015
2. Brij Lal, M N Avadhanulu & N Subrahmanyam, “A Text Book of Optics”, S Chand Publishing, 2012
20XC14 DIGITAL SYSTEM DESIGN
3 2 0 4
INTRODUCTION: Basic principles of System Design -Building blocks for Computer Systems; CPU, Storage, I/O, Multimedia devices - Functional components of a computer system- Workstations, Servers - Interaction among functional components. (4)
NUMBER REPRESENTATION: Binary - Octal - Hexadecimal - BCD - excess three - Gray codes - Error correcting and detecting codes - Representation of signed numbers – arithmetic operation on signed numbers - Alphanumeric data representation. (5)
BOOLEAN ALGEBRA AND LOGIC GATES: Boolean relations - Laws and theorems - AND, OR, NOT, NAND and NOR gates - exclusive OR gates - Positive and negative logic systems - Simplifications - Karnaugh maps and simplifications - Don’t care conditions - NAND-NAND realizations-PAL and PLA Logics. (8)
DESIGN OF ARITHMETIC AND LOGIC UNIT:Combinational logic circuits – Encoder, Decoder, Multiplexer and Demultiplexer -Representation of integer data, Integer adders, Integer multipliers, Design of integer unit- floating point representation of real data-IEEE representation Floating-point adder/subtractor- Floating-point multiplier, Design of Floating point unit- design of ALU. (10)
DESIGN OF REGISTERS AND MEMORY UNIT: Flip-flops, Synchronous sequential circuits – Registers and Counters; Memory unit construction – State Machine Design - State machine as a sequential controller; Moore and Mealy state machines; Derivation of state graph and tables; Sequence detector (8)
PROGRAM EXECUTION: : Processing of High Level Language Code:- Assembler- Code generation,-Application binary interface-Interpreter - simple compiler - Instruction set architecture of a simple CPU, Micro architecture of CPU, Generation and Execution of machine code- The hardware-software interface -Hardware features influenced by software requirements - Specifications of the performance of a system (10)
Total L: 45+30=75
TUTORIAL PRACTICE:
1. Study of basic logic gates and realization of logic gates using universal gates.
2. Multiplexer and Demultiplexer.
3. Half and full adder / subtractor.
4. Encoder and decoder.
5. Binary counter.
6. BCD to seven segment decoder.
7. Study of D/A converter.
TEXT BOOKS:
1. C.H. Roth and L.L.Kinney, “Fundamentals of Logic Design”, Cengage Learning, 2014
2. William Stallings, “Computer Architecture and Organization Designing for Performance”, Pearson Education, 2014.
3. David A. Patterson, John L. Hennessy, “Computer Organization and Design: The Hardware/Software Interface”, Morgan Kaufmann, 2013.
4. C.Hamacher, Z.Vranesic, S.Zaky and N.Manjikian, “Computer Organization and Embedded Systems”, McGraw-Hill, 2012.
5. N. Nisan and S. Schocken, “The Elements of Computing Systems – Building a Modern Computer from First Principles”, The MIT Press, 2005.
REFERENCES:
1. Mano M.M, "Computer System Architecture", Pearson Education, 2017
2. S. Brown, Z Vranesic, “Fundamentals of Digital Logic with VHDL Design”, McGraw-Hill Education, 2009
20XC15 PROBLEM SOLVING AND C PROGRAMMING
4 0 0 4
PROBLEM SOLVING: Introduction to Problem Solving- Program development- Analyzing and Defining the Problem- Algorithm-Flow Chart - Programming languages-Types of programming languages- Program Development Environment. (5)
C LANGUAGE: Introduction to C Language - C Character Set - Identifiers and Keywords - Data Types – Literal Constants - Variables – l-value-r-value - Qualifiers – Modifiers - Operators and Expressions – Type conversions - Library Functions - Data Input and Output Functions – escape sequence characters – Formatted input and output. (6)
CONTROL STATEMENTS:Making Decisions : If Statement – If/else Statement - If/else if Statement – Nested if Statements – dangling else - Switch Multiple Selection Statement– Repetition : Repetition Essentials - While Loop – do-While Loop – For Loop – Nested Loops – Breaking out of a Loop Continue statement – goto Statement (6)
FUNCTIONS: Modular Programming – Function Prototypes - Defining and Calling Functions –Function Call Stack and Activation Records - Passing Arguments to Functions – Returning a value from a function- Recursion – Recursion vs. Iteration – Scope and lifetime of variables – Memory layout of a C program - Storage Classes - Auto - Static - Extern and Register Variables. (8)
ARRAYS:Defining Array –Array Initialization - Accessing array elements - Processing arrays - Arrays as function arguments - Multidimensional arrays – Memory address calculation of an array – Row major and column major order - String Handling. (8)
POINTERS: Pointer Variable Definitions and Initializations – Passing Arguments to Functions by address – Pointer Expressions and Pointer Arithmetic - Relationship between Pointers and Arrays - Pointers and multidimensional arrays –Constant Pointer – Pointer to Constant –NULL pointer- dangling pointers - Pointers to functions - passing functions to other functions – Introduction to Stack and Heap Memory - Dynamic Memory Allocation. (10)
STRUCTURES AND UNIONS: Structure Definitions – Initializing Structures – Accessing Structure Members - Processing a structure - typedef- Structures and pointers - Passing structures to functions – Self-Referential Structures- Bit fields - Unions – Enumeration Constants (8)
FILES: Files and Streams - Operations on Files – Types of Files, Various Read and Write Functions for Sequential-Access and Random-Access Files -Command Line Arguments. (5)
PREPROCESSOR DIRECTIVES: : #include Preprocessor Directive - #define Preprocessor Directive: Symbolic Constants - #define Preprocessor Directive : Macros - Conditional Compilation (5)
Total L: 60
TEXT BOOKS:
1. Brian W. Kernighan and Dennis Ritchie, “The C Programming Language”, Pearson Education India, 2015
2. R G Dromey, “How to solve it by Computer”, Pearson ,2008.
REFERENCES:
1. Herbert Schildt, “C The Complete Reference", McGraw Hill, 2017.
2. Gottfried B, “Programming with C”, McGraw Hill, 2011.
3. Peter Prinz and Tony Crawford, “C in a Nutshell”, O′Reilly, 2016.
20XC16 MATHEMATICAL FOUNDATIONS LAB
0 0 4 2
1. Functions: Definition and examples
2. Limits and Continuity of functions
3. Plot 2D and 3D functions.
4. Taylor series for functions of single variable.
5. Matrices: Simple operations.
6. Solving system of Linear equations.
7. Programs on differentiation and integration.
8. Finding maxima and minima
9. Evaluation of multiple integrals
10. Solving differential equations
Total P: 60
20XC17 C PROGRAMMING LAB
0 0 4 2
1. Simple programs to understand the concepts of data types.
2. Familiarizing conditional, control and repetition statements.
3. Usage of single and double dimensional arrays including storage operations.
4. Implementation of functions, recursive functions.
5. Defining and handling structures, array of structures and union.
6. Implementation of pointers, operation on pointers dynamic storage allocation.
7. Creating and processing data files.
Total P: 60
20XC18 APPLIED PHYSICS AND DIGITAL ELECTRONICS LAB
0 0 2 1
APPLIED PHYSICS LABORATORY:
1. Determination of the moment of inertia of a flywheel.
2. Verification of Hooke's law using spring-mass system.
3. Determination of thermal conductivity of bad conductor - Lee's disc method.
4. Determination of thermal conductivity of good thermal conductor-Forbes method.
5. Determination of the relative humidity by using wet and dry bulb hygrometer.
6. Determination of refractive index of liquids using hollow prism.
Total P: 30
20XC21 DISCRETE STRUCTURES
3 2 0 4
MATHEMATICAL LOGIC: Proposition - Logical operators - Truth tables – Laws of Logic – Equivalences – Normal forms - Rules of inference - Validity of arguments – Consistency of specifications – Propositional Calculus – Quantifiers and universe of discourse. (10+7)
PROOF TECHNIQUES: Introduction – Methods of proving theorems – Direct proofs, Indirect proofs – Mathematical induction – Strong mathematical induction and well ordering. (6+4)
RELATIONS AND FUNCTIONS: Definition and properties of binary relations – Representing Relations – Closures of Relations – Composition of Relations – Equivalence Relations – Partitions and Covering of Sets – Partial Orderings – n-ary Relations and their Applications. Functions - Injective, Surjective, Bijective functions, Composition, Identity and Inverse (9+7)
COMBINATORICS: Basics of counting – The Pigeonhole principle - Permutations and Combinations with and without repetition, Permutations with indistinguishable elements, distribution of objects - Generating permutations and combinations in lexicographic order. (8+4)
RECURRENCE RELATIONS: Some Recurrence Relation Models- Solutions of linear homogeneous recurrence relations with constant coefficients- solution of linear non-homogeneous recurrence relations by the method of characteristic roots. (5+4)
GRAPHS AND TREES: Graph terminologies - graph models – special types of graphs - ismorphic graphs- connectivity- Euler and Hamiltonian path--graph coluring- trees- spanning trees. (7+4)
Total L:45+T:30=75
TEXT BOOKS:
1. Kenneth H Rosen, “Discrete Mathematics and its Application”, McGraw Hill, 2017.
2. Tremblay J P and Manohar R, “Discrete Mathematical Structures with application to Computer Science”, Tata McGraw Hill, 2017.
REFERENCES:
1. Judith L. Gersting, “Mathematical Structures for Computer Science”, W.H. Freeman and Company, 2014
2. Doerr Alan and Levasseur K, "Applied Discrete Structures for Computer Science", Galgotia Publications, 2010.
3. Benard Kolman, Robert C Busby and Sharan Ross, "Discrete Mathematical Structures", Pearson Education, 2014.
4. Ralph P Grimaldi, “Discrete and Combinatorial Mathematics – An Applied Introduction”, Addison Wesley, 2009.
20XC22 ALGEBRA AND NUMBER THEORY
3 2 0 4
GROUPS: Groups - Definition and Example, Properties, Permutation Groups, Symmetric Groups, Cyclic Groups. Finite groups-Generators and primitive roots-Subgroups – Definition, Cosets -Lagrange’s theorem- Homomorphism. (6+4)
RINGS: Definition and Properties – Subrings- Ring of Quaternions – Homomorphism- Integral domain – Ideals and Quotient Rings. (6+4)
FIELDS & POLYNOMIALS: Definition – subfields - Finite fields – structure of Finite field, GF (2n) - Polynomial Rings – Irreducible polynomial over finite fields - Factorization of Polynomials – Primitive polynomials. (9+6)
INTRODUCTION TO NUMBER THEORY: Divisibility and Primes – Greatest common divisors - fundamental theorem of arithmetic- Euclidean and Extended Euclidean algorithms. (6+4)
MODULAR ARITHMETIC AND CONGRUENCE: Modular operator- Set of residues– modular exponentiation - fast exponentiation algorithms- inverse-congruence- Basic properties - Residue classes –Solving linear congruence’s- Chinese remainder theorem- Linear Diophantine equations–system of linear congruence’s with two unknowns. (10+6)
PRIMALITY AND FACTORIZATION: : Euler’s Phi function - Fermat’s little theorem - Euler’s theorem -Legendre and Jacobi symbols - Primality testing –Deterministic and probabilistic algorithms - Miller Rabin algorithm - factorization methods -- Pollard's Rho Algorithm-Integer factorization problem - Fermat method – Quadratic congruence - Quadratic residues - Discrete logarithms-Discrete log problem. (8+6)
Total L:45+T:30=75
TEXT BOOKS:
1. Herstein I N., “Topics in Algebra”, John Wiley, 2012.
2. Joseph A. Gallian, “Contemporary Abstract Algebra”, Brooks/Cole, 2013.
3. Victor Shoup, “A Computational introduction to Number Theory and Algebra”, Cambridge University Press, 2012.
REFERENCES:
1. Ron M. Roth, “Introduction to Coding Theory”, Cambridge University Press, 2016.
2. Ralph P. Grimaldi and Ramana B. V., “Discrete and Combinatorial Mathematics: An Applied Introduction”, Pearson Education, 2014.
3. Tom Apostol, “Introduction to Analytic Number Theory”, Springer, 2010.
4. Neal Koblitz, “A course in Number Theory and Cryptography”, Springer, 2012.
20XC23 DATA STRUCTURES
3 0 0 3
Prerequisites:
INTRODUCTION: Primitive Data Structures - Abstract Data Types - Analysis of algorithms – Best and worst case time complexities – Asymptotic notation – Growth of functions. (4)
ARRAYS: Operations and Implementation – Linear search, non-recursive binary search – Sparse matrices – Operations (3)
STACKS: Primitive operations-Applications: Expression Processing, parenthesis matching (4)
QUEUES: Primitive operations – Linear queue, Circular queue, Double ended queue, Priority Queues – Applications (5)
LISTS: Primitive Operations - Singly linked lists, doubly linked lists, Circular lists, multiply linked list– Linked Stacks - Linked queues (6)
TREES: Terminologies - Binary Trees - Sequential and linked representation - Traversals - Expression trees - Infix, Postfix and Prefix expressions-Threaded trees - Max heap and Min heap and their operations. (6)
DICTIONARY DATA STRUCTURES: Binary search tree: Searching – Insertion and deletion of elements – Analysis, Hash Table-hash Function –Collision resolution techniques –linear probing-chaining- AVL Trees: Searching, insertion and deletion of elements –Analysis. (10)
MULTIWAY SEARCH TREES: Indexed Sequential Access – m-way search trees – B-Tree – searching, insertion and deletion – B+ trees. (7)
Total L:45
TEXT BOOKS:
1. Yedidyah Langsam, Moshe J Augenstein and Aaron M Tenenbaum, "Data structures using C and C++", Prentice Hall, 2016.
2. Sartaj Sahni, "Data Structures, Algorithms and Applications in C++", Silicon Press, 2013
3. Michael T. Goodrich, Roberto Tamassia and David Mount, “ Data Structures and Algorithms in C++”, John Wiley, 2016.
REFERENCES:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, Addison-Wesley, 2017.
2. Robert L Kruse, Bruce P Leung and Clovis L Tondo, “Data Structures and Program Design in C”, Pearson Education, 2013.
3. Nell Dale, Chip Weems and and Tim Richards, “C++ Plus Data Structures”, Jones and Bartlett Learning, 2017.
4.Alfred V. Aho, John E Hopcraft,JeffreyD. Ullman,”Data structures and Algorithms”,Pearson Education, 2011
20XC24 OBJECT ORIENTED PROGRAMMING
3 0 0 3
Prerequisites:
PRINCIPLES OF OBJECT ORIENTED PROGRAMMING: Software crisis - Software Evolution - Procedure Oriented Programming - Object Oriented Programming Paradigm - Basic Concepts and Benefits of OOP - Object Oriented Programming Language - Application of OOP - Structure of C++ - Tokens, Expressions and Control Structures -Operators in C++ - Manipulators. (6)
FUNCTIONS IN C++: Function Prototyping - Call by Reference - Return by reference - Inline functions - Default, Const Arguments - Function - Overloading - Classes and Objects - Member functions - Nesting of Member functions - Private member functions - Memory allocation for Objects - Static data members - Static Member Functions - Array of Objects - Objects as Function Arguments - Friend Functions - Returning Objects - Const Member functions - Pointers to Members (10)
CONSTRUCTORS: Parameterized Constructors - Multiple Constructors in a Class - Constructors with Default Arguments - Dynamic Initialization of Objects - Copy and Dynamic Constructors – Destructors overloading. (3)
OPERATOR OVERLOADING: Overloading Unary and Binary Operators - Overloading Binary Operators using Friend functions – Operator Type conversion. (3)
INHERITANCE: Defining Derived Classes - Single Inheritance - Making a Private Member Inheritable - Multiple Inheritance - Hierarchical Inheritance - Hybrid Inheritance – Function overriding – Virtual functions - Virtual Base Classes - Abstract Classes - Constructors in Derived Classes - Member Classes - Nesting of Classes – Composition – Aggregation. (9)
POLYMORPHISM: Basics of polymorphism – Types of polymorphism - Compile and Run Time Polymorphism - Virtual function – Object Slicing – Virtual Destructor – Dynamic binding. (5)
TEMPLATES & EXCEPTION HANDLING: Introduction to Templates, Generic Functions and Generic Classes – Exception Handling – Examples (4)
STREAMS: String I/O -Character I/O - Object I/O - I/O with multiple Objects - File pointers - Disk I/O with member functions (5)
Total L:45
TEXT BOOKS:
1. Bjarne Stroustrup, “The C++ Programming Language”, Pearson Education, 2014.
2. Stanley B. Lippman, Josee Lajoie and Barbara E. Moo, “The C++ Primer”, Addison Wesley, 2013.
REFERENCES:
1. Scott Meyers, “Effective C++”, Addison Wesley, 2005.
2. Scott Meyers, “More Effective C++”, Addison Wesley, 2008.
3. Bjarne Stroustrup, “The Design and Evolution of C++”, Addison Wesley, 2005.
4. Stanley B Lippman, “Inside the C++ Object Model”, Addison Wesley, 1996.
20XC25 COMPUTER ARCHITECTURE
3 0 0 3
Prerequisites:
BASIC ARCHITECTURE: Functional Units - Basic Operational Concepts-Performance –Instruction Set Architecture - Memory Locations and Addresses - Memory Operations - Instructions and Instruction Sequencing-- Addressing Modes -Stacks -Subroutines - Assembly Language -Additional Instructions- RISC and CISC instructions (9)
BASIC PROCESSING UNIT:Fundamental Concepts--Instruction Execution-Hardware Components-Instruction Fetch and Execution Steps-Control Signals - Hardwired Control - CISC- Processors and RISC processors – Design of ALU (8)
MEMORY SYSTEM: Basic Concepts- Internal Organization of Memory - Semiconductor RAM Memories - Static and Dynamic RAMs - Read-only Memories - Flash Memory - Direct Memory Access - -Cache Memories - Performance Considerations - Hit Rate and Miss Penalty- Caches on the Processor Chip-Virtual Memory--Secondary storage (10)
INPUT/OUTPUT INTERFACES: Bus Structure - Operation - Synchronous and Asynchronous Bus - FireWire - PCI Bus - SCSI Bus - SATA - SAS - PCI Express - Interface Circuits- Parallel/Serial /Universal Serial Bus (USB) Program-Controlled I/O - I/O Programs for RISC and CISC - Interrupts - Handling Multiple Devices - Exception handling (10)
PIPELINING: Basic Concept— Pipeline Organization - Pipelining Issues - Data Dependencies - Operand Forwarding - Handling Data Dependencies in Software - Memory Delays- Branch Delays - Branch Prediction -Resource Limitations -Performance Evaluation (8)
Total L:45
TEXT BOOKS:
1. Carl Hamacher, Zvonkovranesic, Zaky, “Computer organization and Embedded Systems”, McGrawHill, 2012.
2. John Hennessy and David Patterson, "Computer Architecture: A Quantitative approach", Elsevier India Publishers, 2017.
3. William Stallings, “Computer Organisation and Architecture – Designing for performance”, Pearson Publishers, 2014
REFERENCES:
1. Mano M.M, "Computer System Architecture", Pearson Publishers, , 2017.
2. Kai Hwang and Faye A Briggs, "Computer Architecture and Parallel Processing", McGraw Hill Book Company, 2016.
20XC26 DATA STRUCTURES LAB
0 0 4 2
Implementation of the following problems:
1. Sparse and dense Matrix operations using arrays.
2. Linked Lists: Singly linked, Doubly linked and Circular lists.
3. Problems using Stacks and queues
4. Binary trees, Binary search trees implementation and problems
5. Dictionary implementation using hash tables
6. AVL tree implementation
7. B-tree and it’s operations.
Total P: 60
20XC27 OBJECT ORIENTED PROGRAMMING LAB
0 0 4 2
1. Arithmetic operations using array of objects and dynamic data members.
2. Creation of a class having read-only member function and processing the objects of that class.
3. Creation of a class which keeps track of the member of its instances. Usage of static data member, constructor and destructor to maintain updated information about active objects.
4. Illustration of a data structure using dynamic objects.
5. Usage of static member to count the number of instances of a class.
6. Illustration for the need of default arguments.
7. Usage of a function to perform the same operation on more than one data type.
8. Creation of a class with generic data member.
9. Overloading the operators to do arithmetic operations on objects.
10. Acquisition of the features of an existing class and creation of a new class with added features in it.
11. Implementation of run time polymorphism.
12. Overloading stream operators and creation of user manipulators.
13. Implementation of derived class which has direct access to both its own members and the public members of the base class.
Total P: 60
20XC28 PYTHON PROGRAMMING LABORATORY
0 0 4 2
INTRODUCTION: Development Tools (IDE) – Python shell - Python Basics – Data types - Control flow.
CORE PYTHON LANGUAGE: Lists - Tuples - Dictionaries - Strings – Regular expressions - Functions - File input/output – Exception handling.
OBJECT-ORIENTED DESIGN: Inheritance – Polymorphism.
PACKAGING AND DISTRIBUTION: Modules – Packages – Python standard libraries - pip.
STANDARD PACKAGES: NumPy – Matplotlib – SciPy – SymPy – Pandas.
LAB PROGRAMS:
1. Exercises to test basic coding skills in Python using data types, control statements and iteration.
2. Programs to implement Python data structures like lists, tuples, dictionaries, and sets.
3. Programs covering general programming concepts such as functions, strings, regular expressions, reading / writing files and exceptions.
4. Standalone programs to implement object oriented concepts.
5. Packaging their programs into reusable libraries.
6. Write programs to use libraries for numerical programming and data visualization.
Total L: 60
TEXT BOOKS:
1. Mark Lutz, “Learning Python”, O’Reilly Media, 2013.
2. Tony Gaddis, “Starting out with Python”, Pearson, 2017.
REFERENCES:
1. Christian Hill, “Learning Scientific Programming with Python”, Cambridge University Press, 2016.
2. Allen Downey, ‘Python for Software Design”, Cambridge University Press, 2009.
20XC31 PROBABILITY AND STATISTICS
3 2 0 4
Prerequisites:
SAMPLE SPACE AND PROBABILITY: Sets, probabilistic models, conditional probability, total probability theorem and Bayes’ rule,independence, gamblers ruin problem. (6+4)
DISCRETE RANDOM VARIABLES:Random variables concept- Probability mass function. Expectation, mean, and variance. Bernoulli, Binomial, Poisson and Geometric random variables. Joint probability mass function of multiple random variables, conditioning, independence. (6+4)
CONTINUOUS RANDOM VARIABLES: Probability density function, cumulative distribution function, Uniform,Normal, Exponential, Weibull, and Gamma random variables. Joint probability density function of multiple random variables, conditioning, continuous Bayes’ rule. Sums of independent random variables, convolution, covariance, correlation, and conditional expectation (6+4)
LIMIT THEOREMS: Markov and Chebyshev inequalities, Weak Law of Large Numbers, Convergence in probability, Central Limit Theorem, Strong Law of Large Numbers. (5+3)
SAMPLE AND POPULATION: Sample mean, confidence interval construction, estimating the variance of the sample mean, confidence intervals for population means, standard error estimates (6+4)
SIGNIFICANCE OF EVIDENCE: Significance, p-values, comparing the mean of two populations, other useful tests of significance (6+4)
INFERRING PROBABILITY MODELS FROM DATA: Estimating model parameters with Maximum Likelihood, incorporating priors with Bayesian inference, Bayesian inference for Normal distributions (6+4)
REGRESSION: Regression to make predictions, to spot trends, linear regression and least squares, Producing Good Linear Regressions
Total L:45+T:30 = 75
TEXT BOOKS:
1. Dimitri P. Bertsekas and john N,Tsitsiklis, ‘Introduction to Probability’, Athena Scientific, 2008.
2. David Forsyth, ‘Probability and Statistics for Computer Science’, Springer; 2018
3. Michael J. Evans, Jeffrey S. Rosenthal, ‘Probability and Statistics - The Science of Uncertainty’. W H Freeman & Co, 2010
REFERENCES:
1. Saeed Ghahramani, ‘ Fundementals of probability with Stochastic Processes’, Pearson, 2019.
2. Sheldon M. Ross, ‘Probability and Statistics for Engineers and Scientists’, Academic Press, 2014
3. H. Degroot, Mark J. Schervish, ‘Probability and Statistics’ Addison Wesley,,2018.
20XC32 MICROCONTROLLERS AND EMBEDDED SYSTEM
4 0 0 4
Prerequisites:
MICROPROCESSOR ARCHITECTURE: Fundamentals of Microprocessor Architecture. 8-bit Microprocessor and Microcontroller architecture, Comparison of 8-bit microcontrollers, 16-bit and 32-bit Microcontrollers - 8086 Architecture-Functional diagram - Memory Segmentation, Programming Model- Physical Memory Organization, Architecture of 8086 (10)
MICROCONTROLLER ARCHITECTURE:Introduction to Microcontroller- Role of microcontrollers in Embedded system - Types and Architecture, TIMERS and Counters, Interrupts - Watchdog - Programming model of Microcontroller- overview of Programming language, Compilers and assemblers - Open source hardware platform – ASIC embedded system – SoC Architecture – OS and Non OS based microcontroller (15)
SENSORS AND ACTUATORS: Types of Sensors - Analog, Digital -Models of Sensors and Actuators- Common sensors-Actuators (6)
COMMUNICATION INTERFACE: On board Communication Interfaces- I2C Bus, SPI Bus, UART , Interfacing with LEDs, Seven Segment, Sensors, Basic concepts of LCD,ADC, DAC, Relays etc. and their interfacing to microcontroller- Debugging interface- JTAG emulator (14)
ARM ARCHITECTURE: ARM Processor fundamentals, ARM Architecture – Register, CPSR, Pipeline, exceptions and interrupts interrupt vector table, ARM instruction set – Data processing, Branch instructions, load store instructions, Software interrupt instructions, Program status register instructions, loading constants, Conditional execution, Introduction to Thumb instructions. (15)
Total L:60
TEXT BOOKS:
1. William Hohl and Christopher Hinds, “ARM Assembly Language Fundamentals and Techniques”, CRC Press, 2015.
2. Muhammad Ali Mazidi, Rolin D. Mckinlay, Janice Gillispie Mazidi, “The 8051 Microcontroller: A Systems Approach”, Pearson Education, Limited, 2013
3. Danny Causey, Muhammad Ali Mazidi and Rolin D. McKinlay, “PIC Microcontroller & Embedded System: Using Assembly and C for PIC18”, Pearson Education India, 2008.
4. Myke Predko, “Programming and Customizing the PIC Microcontroller”, Tata McGraw Hill, 2008.
REFERENCES:
1. Mazidi M.A., Mazidi J.G. and McKinlay R.D., “The 8051 Microcontroller and Embedded Systems”, Prentice Hall India,, 2007.
2. Andrew Sloss, Dominic Symes, Chris Wright, “ARM System Developer's Guide, Designing and Optimizing System Software”, Morgan Kaufmann Publishers, 2004.
3. John B. Peatman, “Design with PIC Microcontrollers”, Prentice Hall, 2003.
20XC33 LINEAR ALGEBRA
3 2 0 4
Prerequisites:
SYSTEM OF LINEAR EQUATIONS: System of linear equations, Gauss – elimination, Gauss-seIdal method- Application of Linear systems. (5+3)
VECTOR SPACES:Vector spaces and subspaces – Span, Linear independence and dependence– Basis and dimension - Row space, Column space, and Null space– Rank and nullity- Change of basis– Similarity - Isomorphism (10+7)
INNER PRODUCT SPACES: Inner products, Length and Angle in inner product spaces - Orthonormal bases, Gram Schmidt process - Orthogonal matrices- QR decomposition - Best Approximation and Least-squares. (10+7)
LINEAR TRANSFORMATION: Introduction to linear transformations – General Linear Transformations – Kernel and range – Matrices of general linear transformation- Geometry of linear operators. (6+4)
SPARSE MATRICES : Introduction – Storage Schemes – Basic sparse matrix operations – Sparse direct solutions – random walk problems. (4+2)
EIGEN VALUES AND EIGEN VECTORS: In10r7duction to Eigen values Eigen vectors, Complex Eigen values, - Diagonalization - Orthogonal diagonalization- Positive definite matrices - Quadratic forms - Quadric surfaces - Singular value decomposition. Applications to differential equations, dynamical systems (10+7)
Total L:45+T:30=75
TEXT BOOKS:
1. Howard Anton and Chris Rorres, “Elementary Linear Algebra”, John Wiley& Sons, 2017.
2. David C. Lay, “Linear Algebra and its Applications’, Pearson Education, 2016
REFERENCES:
1. Gilbert Strang, “Linear Algebra and its Applications”, Thomson Learning, 2016.
2. Steven J. Leon, “Linear Algebra with Applications”, Prentice Hall, 2015.
3. Yousef Saad, “Numerical methods for Large Eigenvalue Problems”, University Press, 2011.
20XC34 DATABASE DESIGN
3 0 0 3
Prerequisites:
BASIC CONCEPTS : Introduction to databases – Conventional file processing – Characteristics of a database – Data Models – Data abstraction - Three Schema architecture – Data Independence – Database Languages – Database System Environment – Database architecture - Advantages and disadvantages of DBMS – Users of DBMS. (5)
DATA MODELING:Introduction – entities, attributes, relationships – Structural and participation constraints – High Level conceptual data model - ER Diagrams(ERD) – Specialization and Generalization Constraints – Enhanced ER diagrams(EER) – Mapping of ER/EER into Relational Schema. (5)
RELATIONAL MODEL AND CONSTRAINTS: Introduction – Relational data model – Data Integrity Constraints – Introduction to Relational Algebra – Relational algebra queries. -RELATIONAL DATABASE MANIPULATION: Structured Query Language (SQL) - Basic data retrieval – SQL Joins – SQL complex queries – Views – Advanced SQL (8)
FILE ORGANIZATION : Storage device characteristics – Constituents of a file – Operations on file - Serial files – Sequential files – Hashing techniques - Index Sequential files – Direct files – Primary, secondary and cluster indexes – Indexing using Tree structures, SQL Query processing and optimization (7)
DATA BASE DESIGN THEORY: Functional dependencies – Normal forms based on primary keys – First, Second and Third Normal forms - Boyce Codd Normal form - Multivalued dependencies – Fourth Normal form - Decomposition Algorithms for relational database design (6)
TRANSACTION AND SECURITY MANAGEMENT: Introduction - Serializability and concurrency control – Locking techniques - Times Stamping Method – Deadlock - Recovery Techniques (5)
DATA BASE SECURITY AND ATTACK VULNERABILITIES: Security and Integrity threats – Access Controls and Defense mechanisms: Access Control Models, Properties of Access Control models, Statistical databases: Differential Privacy, Injection, SQL Injection attacks, Vulnerabilities - Data provenance (9)
Total L:45
TEXT BOOKS:
1. Elmasri R and Navathe SB, “Fundamentals of Database Systems”, Pearson Education, 2016.
2. Silberschatz A, Korth H and Sudarshan S, “Database System Concepts”, McGraw Hill, 2019.
REFERENCES:
1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom, ”Database Systems: The Complete Book,”, Pearson Education, 2011.
2. Raghu Ramakrishnan and Johannes Gehrke, “Database Management System”, McGraw Hill, 2014.
20XC35 DESIGN AND ANALYSIS OF ALGORITHM
4 0 0 4
Prerequisites:
INTRODUCTION: Methods of specifying an algorithm-deciding an appropriate data structure and algorithm design technique-Best, worst and average case complexities –analysis of recursive algorithms - Master’s theorem (3)
SORTING ALGORITHMS: Insertion sort- Selection sort- Heap sort-Radix sort-time complexity analysis (3)
GRAPHS: Terminologies– Representations using Adjacency matrix, adjacency list - Graph Traversal Algorithms - Breadth first and Depth first - Analysis –Connected components- Shortest path- Analysis. (4)
DIVIDE AND CONQUER: Method– Binary search- Merge sort and Quick sort – Large integer multiplication- Strassen’s matrix multiplication. (6)
GREEDY METHOD: Optimization problems – Method – Minimum cost spanning tree (Kruskal’s and prim’s algorithms), Topological sorting, Huffman codes (6)
DYNAMIC PROGRAMMING: Method – All pairs shortest path problem – Longest common subsequence-Traveling salesman problem (6)
STRING MATCHING: Naïve algorithm- Rabin Karp - Knuth Morris Pratt algorithm (3)
NP-HARD, NP-COMPLETE CLASSES: Basic concepts – Non deterministic algorithms – Satisfiability problem – NP-hard and NP-complete Problems- Polynomial time reduction -3-SAT and independent set-–Space Complexity: class PSPACE- some hard problems in PSPACE complete-QSAT (7)
BACK TRACKING: Method – N-queen’s problem - Graph coloring (3)
BRANCH AND BOUND: Method – 0/1 Knapsack, Traveling Salesman problem (4)
Total L:45
TEXT BOOKS:
1. Thomas H. Cormen, Charles E Leiserson and Ronald L Rivest, “Introduction to Algorithms”, MIT Press, 2015.
2. Jon Klienberg, Eva Tardoss, “Algorithm Design”, Pearson, 2013.
REFERENCES:
1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Pearson, 2014.
2. Michael T. Goodrich, Roberto Tamassia, “Algorithms Design, Foundations, analysis and Internet Examples”, Wiley, 2014.
3. Parag H Dave, Himanshu B Dave, “Design and Analysis of Algorithms”, Pearson Education, 2014
20XC36 EMBEDDED SYSTEMS LAB
0 0 4 2
Assembly language programming on
1. Data transfer instructions using different addressing modes and block transfer.
2. Arithmetic operations in binary and BCD-addition, subtraction, multiplication and division
3. Multi-precision addition and subtraction.
4. Conversion of BCD numbers into ASCII characters and vice versa.
5. Delay loop implementation.
6. Implementation of Control Structures (FOR, LOOP, IF.. THEN, DO..WHILE etc.,).
7. Array processing
8. String processing
9. Procedures and Interrupts
Implement the following for embedded systems (Using 8051 or any other open source hardware platforms like PIC, Arduino, MSP430, ARM etc)
1. Design and Layout of an Embedded System
2. Interfacing ADC and DAC.
3. Interfacing LED and PWM.
4. Interfacing real time clock and serial port.
5. Interfacing keyboard and LCD.
6. Interfacing EPROM and interrupt.
7. Study of ARM evaluation system
8. Implementing zigbee protocol with ARM.
9. Interrupt performance characteristics of ARM and FPGA.
10. JTAG hardware debugging interface
11. Software Drivers for an Embedded System
Total P: 60
20XC37 DESIGN AND ANALYSIS OF ALGORITHMS LAB
0 0 4 2
Implementation of the following problems:
1. Sorting algorithms implementation and it’s comparison
2. Problems on graph traversals
3. Strassen matrix multiplication and large integer multiplication using divide and conquer approach
4. Prims minimum cost spanning tree
5. Kruskal’s minimum cost spanning tree using min heap data structure, union and find operation
6. Application of all pairs shortest path problem , longest common subsequence
7. Application of N QUEENS using back tracking
8. TSP, 0/1 knapsack Problem using branch – and - bound
Total P: 60
20XC38 DATA BASE DESIGN LAB
0 0 4 2
Implementation of the following problems:
1. Working with DDL and DML for creation and manipulation of single, multiple tables, Report Generation.
2. Practising DCL commands to control access privileges.
3. Working with TCL commands to manage transactions in databases.
4. Working with PL/SQL- Triggers and stored procedures.
5. Developing Packages using databases.
Total P: 60
20XC41 OPTIMIZATION TECHNIQUES
3 0 0 3
Prerequisites:
CLASSICAL OPTIMIZATION :Introduction - Classification of optimization problems – Single variable optimization - Multi variable optimization with equality constraints and inequality constraints – solution by the method of Lagrange multipliers - Kuhn –Tucker conditions. (12)
LINEAR PROGRAMMING: Linear Programming model – Graphical method, Simplex method, Two phase simplex method – Revised Simplex method – Sensitivity Analysis - Dual and Primal problems – Dual Simplex method – Post Optimal Analysis. (14)
TRANSPORTATION MODEL AND ITS VARIANTS: Transportation problem and its solution – Assignment problem and its solution by Hungarian method (6)
DYNAMIC PROGRAMMING : Principle of optimality - Forward and Backward Recursion methods – Shortest route problem - Knapsack model – Work force size model (6)
NON LINEAR PROGRAMMING: Direct Search Methods – Univariate method, Hooke and Jeeves method – Indirect search methods – Steepest descent method, Conjugate gradient method. (7)
Total L:45
TEXT BOOKS:
1. Hamdy A Taha,, “Operations Research :An Introduction”, Pearson Education, 2017.
2. Singiresu S Rao, “Engineering Optimization Theory and Practice”, John Wiley, 2014.
REFERENCES:
1. Hillier F and Lieberman G J, “Introduction to Operations Research”, Tata McGraw Hill, 2014.
2. Wayne Lwinston, “Operations Research: Applications and Algorithms”, Thomson Brooks/Cole, 2004.
20XC42 COMPUTER NETWORKS
3 0 0 3
Prerequisites:
INTRODUCTION:Network goals - Applications of Networks - Design issues for the layers - OSI Reference Model - Types of Network - Network Topologies- Analog and Digital data transmission- Data encoding- Bandwidth and data rate-.Bit Rate, Baud Rate- Sampling Rate. (5)
DATA COMMUNICATION: Multiplexing - Synchronous and Asynchronous TDM – FDM –CDM - Switching, Circuit Switching, Packet Switching. (3)
TRANSMISSION OF DIGITAL DATA: Transmission Impairments - Single and Multiple bit error correction-Error Detection and Correction - Cyclic Redundancy Check Code -.Hamming Code. (4)
DATA LINK CONTROL AND PROTOCOLS: Line Discipline - Flow Control - Sliding Window Protocol - Error Control - Automatic Repeat Request – Stop and wait - ARQ - Go back by n ARQ - Selective Reject ARQ. (5)
LOCAL AREA NETWORKS: Random Access protocols- Ethernet – Fast Ethernet – Gigabit Ethernet – Wireless LANs- Internetworking- LAN -LAN Connections – Repeaters- Hubs - Bridge – Spanning tree-Switches – Routers (5)
IP: TCP/IP Protocol Structure - Internet Protocol – IP addressing-Subnetting-NAT- IPV6-ICMP-ARP-DHCP (9)
ROUTING: Distance vector routing _ Link state Routing – RIP – OSPF (4)
TRANSPORT LAYER: TCP concepts - Port number – Connection control – Flow control - Congestion Control (5)
APPLICATIONS: MTP - MIME Format, FTP, DNS, HTTP. (5)
Total L:45
TEXT BOOKS:
1. Behrouz A Forouzan, “Data Communications and Networking”, Tata McGraw Hill, 2013
.
2. Behrouz A Forouzan, “TCP/ IP Protocol Suite”, Tata McGraw Hill, 2017.
3. Peterson, Larry L., and Bruce S. Davie. Computer networks: a systems approach. Elsevier, 2012.
REFERENCES:
1. Kevin Fall R and Richard Stevens W, "TCP/IP Illustrated, Volume 1: The Protocols”, Addison-Wesley, Ann Arbor, 2011.
2. James F. Kurose, Keith Ross, “Computer Networking: A Top-Down Approach”, Addison-Wesley, 2017.
3. Douglas Comer, “Internetworking with TCP/IP”, Prentice Hall, 2013.
4. William Stallings, "Data and Computer Communications”, Prentice Hall, 2007.
20XC43 OPERATING SYSTEMS
4 0 0 4
Prerequisites:
INTRODUCTION: Abstract view of an operating system - Operating Systems Objectives and Functions – Evolution of Operating Systems - Dual-mode operation - System calls- Structure of Operating System. (3)
:PROCESS DESCRIPTION AND CONTROL: Process concepts - Process Creation – Process Termination - Process states - Process Description – Process Control. (5)
PROCESS AND THREADS: Relationship between process and threads – Thread States – Thread Synchronization – Types of Thread – Multithreading model. (6)
PROCESS SCHEDULING: Scheduling basics - CPU-I/O interleaving- (non-)preemption - context switching- Types of Scheduling – Scheduling Criteria - Scheduling Algorithms – Algorithm evaluation – Real-time scheduling. (5)
PROCESS SYNCHRONIZATION: Concurrent Process – Principles of Concurrency – Race Condition - Mutual Exclusion – Critical section problems – Software support – Hardware Support – Operating System Support: Semaphore, Monitor – Classical problems of synchronization – Synchronization examples. (8)
DEADLOCK: Principles- Characterization – Methods for handling deadlock - Deadlock prevention, Avoidance, Detection, and recovery. (4)
MEMORY MANAGEMENT: Memory hierarchy –Memory Management requirements - Memory partitioning: Fixed partitioning, Dynamic partitioning, Buddy systems – Simple paging – Page table structures – Simple Segmentation – segmentation and paging. (8)
VIRTUAL MEMORY MANAGEMENT: Need for Virtual Memory management – Demand Paging –Copy on write -Page Fault handling - Page replacement - Frame allocation- Thrashing - working set model. (6)
I/O MANAGEMENT AND DISK SCHEDULING: Organization of I/O function – Evolution of I/O function – Types of I/O devices – Logical Structure of I/O functions – I/O Buffering – Disk I/O – Disk Scheduling algorithms – RAID - Disk Cache. (5)
FILE SYSTEM MANAGEMENT: Files – Access methods - File system architecture – Functions of file management –Directory and disk structure -Mounting - File sharing –File system implementation – Directory implementation - File Allocation – Free space management. (5)
VIRTUALIZATION:> Requirements for Virtualization - Type 1, Type 2 Hypervisors – Paravirtualization- Memory Virtualization - I/O Virtualization - Virtual machines on Multicore CPUs–Virtualization in Multiprocessor environment. (5)
Total L:60
TEXT BOOKS:
1. Silberschatz A, Galvin, PB. and Gagne, G. “Operating System Concepts”, John Wiley & Sons, Inc.,2018
2. William Stallings, “Operating Systems: Internals and Design Principles”, Pearson Education, 2017.
3. Andrew S Tanenbaum, "Modern Operating System", Prentice Hall, 2018.
REFERENCES:
1. Elmasri, E, Carrick A.G. and Levine, D. “Operating Systems: A Spiral Approach”, McGraw Hill, 2014.
2. McHoes, A M and Flynn, I.M. “Understanding Operating Systems”, Cengage Learning, 2016.
3. Dhamdhere D M, “Operating Systems: A Concept-based Approach”, McGraw-Hill, 2015.
20XC44 CRYPTOGRAPHY
3 2 0 4
Prerequisites:
INTRODUCTION: Security goals- cryptographic attacks- Security services and mechanisms. Encryption and Decryption- Cryptosystem- Symmetric-key ciphers- Monoalphabetic ciphers- Polyalphabetic ciphers – one time pad - Cryptanalysis. (6+4)
INFORMATION THEORY: Shannon theory- perfect secrecy- Entropy and Uncertainty- Huffman encodings-properties of entropy. (3+2)
SYMMETRIC KEY CRYPTOGRAPHY: Stream cipher – LFSR stream cipher- Block ciphers – Components - Product ciphers- DES– AES- Cryptanalysis– Modes of operation. (6+4)
PUBLIC KEY CRYPTOGRAPHY:Concept of public key cryptography – RSA cryptosystem – Hard problem - Factorization Problem-Discrete Log Problem - ElGamal cryptosystem–Elliptic curve cryptosystem - Homomorphic encryption - Paillier cryptosystem –cryptanalysis. (9+6)
DATA INTEGRITY TECHNIQUES: Message integrity- message authentication- iterated hash function- merkle- damgard scheme - Structure of MD4 and SHA 512 hash functions. (3+2)
DIGITAL SIGNATURE: : Services – attacks - RSA signature-ElGamal signature- Schnorr signature - Digital signature standard algorithm- Cryptanalysis- strong security notion for digital signatures- provable security for ElGamal signature- Random Oracle model. (6+4)
ENTITY AUTHENTICATION: Data origin authentication and entity authentication – password based authentication– Challenge response protocols – Schnorr identification scheme -Zero knowledge protocols – Fiat-Shamir Protocol – Feige-Fiat-Shamir Protocol– Biometrics. (6+4)
KEY MANAGEMENT PROTOCOLS: Symmetric key distribution– Public key distribution - Needham-Schroeder Protocol – Otway-Rees Protocol – Kerberos – Symmetric Key Agreement Protocol – Diffie-Hellman key Agreement – Digital Certificate - Analysis of Diffie-Hellman – Station-to-Station Protocol. (6+4)
Total L: 45+30=75
TUTORIAL PRACTICE:
1. Implementation of monoalphabetic and polyalphabetic ciphers.
2. Attacks on classical ciphers.
3. Implementation of onetime pad algorithm.
4. Simplified DES implementation.
5. Execution of RSA algorithm for encryption and decryption.
6. Primality testing using Miller Rabin algorithm.
7. Construction of Elliptic curve by generating points on it.
8. Execution of merkle- damgard scheme for computing simple hash values.
9. Execution of RSA algorithm for the digital signature.
10. Implementation of Diffie-Hellman key Agreement scheme and an attack on it.
TEXT BOOKS:
1. Douglas R Stinson, “Cryptography Theory and Practice”, CRC Press,2018.
2. Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography”,CRC press, 2015.
3. Bruce Schneier, ‘Applied Cryptography, Protocols, Algorthms, and Source Code in C’, John Wiley & Sons, 2012.
REFERENCES:
1. Neal Koblitz, “A course in Number Theory and Cryptography”, Springer, 2012.
2. Alfred J, Menezes, Paul C, Van Oorschot and Scott A Vanstone, “Hand Book of Applied Cryptography”, CRC Press, 2010.
3. William Stallings,’ Cryptography and Network Security: Principles and Practice”, Pearson, 2012.
4. Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography and network security”, Tata McGraw Hill, 2017.
5. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno,” Cryptography Engineering: Design Principles and Practical Applications”, Wiley, 2010 .
20XC45 HARDWARE SECURITY
3 2 0 4
Prerequisites:
HARDWARE SECURITY PRIMITIVES: Basics and Vulnerabilities-Sequential System Specification and Implementation - Testability and Verification of Cryptographic Hardware: Fault-tolerance of Cryptographic Hardware- Fault Attacks - Physical Attacks (PA) Basics - Physical Attacks and Countermeasures - Building Secure Systems (6+4)
SIDE CHANNEL ATTACKS AND COUNTERMEASURES: Introduction - Side-channel Attacks on Cryptographic Hardware- Current-measurement based Side-channel Attacks (Case Study: Kocher’s Attack on DES) - Design Techniques to Prevent Side-channel Attacks, Improved Side-channel Attack Algorithms (Template Attack, etc.), (6+4)
SECURE MEMORY COMPONENTS: Timing attacks on memory components - Cache Attacks - Secure cache architectures - Secure cache coherence directories - Secure TLBs - Secure memory controller designs - Mitigating memory bus side channel attack- Exploiting hardware prefetching to mitigate cache timing attacks (8+4)
MICROARCHITECTURAL SECURITY :Introduction - Cold boot attack,- Remanence effect -Meltdown and Spectre- SWAPGS (4+4)
HARDWARE TROJANS: Hardware Trojan Taxonomy - Operating Modes, Countermeasures to Prevent/Detect Hardware Trojans, Logic Testing and Side-channel Analysis based Techniques for Trojan Detection- Trusted IC Design with HT Prevention - Physical Design Obfuscation of Hardware - classical obfuscation approaches - Infrastructure Security: Impact of Hardware Security Compromise on Public Infrastructure, Defense Techniques (Case Study: Smart-Grid Security (10+6)
TRUSTED PLATFORM MODULE: : TPM Operations - Trusted boot- Trusted execution environment (TEE) ; SGX and Trustzone - Secure Element (SE) - Global Platform Device - Trusted Personal Devices - Comparative Analysis of TPM/MTM Technology Contenders (8+4)
EMERGING TECHNOLOGIES: Physical Uncloneable Functions (PUF) Basics - PUF Implementations- Design Techniques to Increase PUF Response Quality (4+3)
Total L: 45+30=75
TUTORIAL PRACTICE:
Implementation of the attacks and counter measures on the following topics
1. Fault attacks
2. Bus Snooping attacks
3. Fault Injection Attacks
4. Hardware Trojan attack detection
5. Hardware Obfuscation
6. Cache timing attacks
7. Memory controller bus attacks
8. firmware readout and protocol logging
9. Cold boot attack,-
10. Meltdown and Spectre
11. Side channel attacks on Crypto hardware
12. Modelling attack onXOR-Arbiter PUF
TEXT BOOKS:
1. Debdeep Mukhopadhyay and R. Subhra Chakraborty, "Hardware Security: Design, Threats, and Safeguards", CRC Press, 2019.
2. J. Szefer and M. Martonosi, “Principles of Secure Processor Architecture Design”, Morgan and Claypool Publishers, 2018.
3. Will Arthur, David Challener, Kenneth Goldman , “A Practical Guide to TPM 2.0,Using the New Trusted Platform Module in the New Age of Security”, Springer, Apress, Berkeley, 2015.
REFERENCES:
1. Mark D. Hill, Jon Masters, Parthasarathy Ranganathan, Paul Turner, John L. Hennessy, “On the Spectre and Meltdown Processor Security Vulnerabilities”, IEEE Hotchips 30, April 2019.
20XC46 COMPUTER NETWORKS LAB
0 0 4 2
1. Familiarize with IP addressing and subnetting concepts and building an interactive subnet calculator
2. Familiarising with virtualization,docker networking.
3. Implement client server programs using sockets which has multiple clients.
4. Network routing concepts in a Linux environment. These include use of the routecommand, defining a DNS server in the /etc/resolv.conf file, and using Network Address Translation(NAT).
5. Familiarize with pcaps and traffic analysis using Wireshark.
6. Network flow record analysis
7. Configure a DNS server , and then try various DNS Pharming attacks
8. Design a mail server and client
9. Implement a web proxy that passes requests and data between multiple web clients and web servers, concurrently.
Total P: 60
20XC47 OPERATING SYSTEMS LAB
0 0 4 2
Linux - History - General structure - Unix file system - file abstraction, directories, mount points, implementation details - Processes: memory image, life cycle, start of day. The shell: basic operation, commands, standard I/O, redirection, pipes, signals. Character and block I/O. Process scheduling.
1. Overview of an Operating System, Boots and Shutdown
2. UNIX File System Commands
3. UNIX Commands
4. SHELL Programming
5. Programs using UNIX System Calls
6. Process Creation and Execution
7. Thread Creation and Execution
8. Process / Thread Synchronization using semaphore
9. Developing Application using Inter Process communication (using sharedmemory, pipes or message queues)
10. Implementation of Memory Management Schemes
11. Creating Linux Modules
Total P: 60
TEXT BOOKS:
1. Robert Love, “Linux System Programming”, O’Reilly, 2013
2. Neil Matthew and Richard Stones, “Beginning Linux programming”, John Wiley, 2011.
3. Dale Doughherty and Arnold Robbins, “SED & AWK programming”, O’Reilly, 2010.
REFERENCES:
1. Chris Simmonds, “Mastering Embedded Linux Programming”, Packt Publishing, 2017
20XC48 JAVA PROGRAMMING LAB
0 0 4 2
JAVA PROGRAMMING: Introduction - Data Types - Operators - Declarations - Control Structures - Arrays and Strings - Input/Output-Java Classes - Fundamentals - Methods - Constructors - Scope rules - this keyword - object based vs oriented programming – Inheritance-Reusability - Composing class - Method overloading - Abstract classes - Virtual Functions. (10)
PACKAGES AND INTERFACES: Packages - Access protection - Importing packages - Interface - Defining and Implementing Interface - Applying Interface - Variables in Interfaces. (8)
EXCEPTION HANDLING: Fundamentals - Exception types - Uncaught Exception - Using Try and Catch - Multiple catch clauses - Nested Try statements - Throw - Throws - Java Built-in Exception - Creating your own subclasses. (8)
MULTI THREADED PROGRAMMING:Java thread model - Priorities - Synchronization - Messaging - Thread class and runnable Interface - Main thread - Creating the Thread - Synchronization - Interthread Communication - Deadlock. (12)
I/O, APPLETS: I/O basics - Stream - Stream Classes - Predefined stream - Reading/Writing console input - Applet fundamentals - Native methods.- GUI Components - Applets - Java Scripts –Swing (12)
COLLECTIONS FRAMEWORK: : Generics – Autobox – Auto unboxing – Annotations – Collections Frame works – List – Set - Map (7)
NEW FEATURES : Functional Programming (3)
PRACTICALS:
1. To create runtime polymorphism using abstract class, interface.
2. To create callback feature using interface.
3. To create a program for interface inheritance.
4. To implement a user defined package.
5. To implement a user defined checked exception and unchecked exception.
6. To create threads, thread groups.
7. To create inter-thread communication using shared memory, piper stream.
8. To implement socket connections (UDP, TCP).
Total P: 60
TEXT BOOKS:
1. Herbert Schildt, “Java: the Complete Reference”, McGraw Hill, 2014.
REFERENCES:
1. Joyce Farrell , “Java Programming”, Cengage Learning, 2015.
2. Patrick Naughton and Herbert Schildt, "JAVA - The Complete Reference", McGraw Hill, 2011.
3. Deitel and Deitel, "JAVA - How to Program", Prentice Hall, 2010.
4. Douglas Lea, “Concurrent Programming in Java: Design Principles and Patterns”, Addison-Wesley, 2000.
20XC51 NETWORK SECURITY
3 2 0 4
Prerequisites:
NETWORK LEVEL SECURITY MECHANISMS: Packet Sniffing and Spoofing- Introduction to IPsec -IPsec Security Associations-Protection Mechanisms -Protection Policy and Enforcement Mechanisms-Transport and Tunnel Modes (5)
VIRTUAL PRIVATE NETWORK: Introduction- How a Virtual Private Network Works –An Overview of How TLS/SSL VPN Works -Building and testing a VPN-Using VPN to Bypass Egress Firewall (6)
IDS: Intrusion Detection and filters, Host-Based IDS vs Network-Based IDS, Snort - Dealing with unwanted traffic: Denial of service attacks – Botnets – Anonymized networks- Tor,I2P (8)
TRANSPORT LAYER ATTACKS:The SYN Flooding Attack - Launching the SYN Flooding Attack - Countermeasure - TCP Reset Attack -Closing TCP -How the Attack Works - Launching the TCP Reset Attack- TCP Reset Attack on Telnet connections -TCP Reset Attack on SSH connections -TCP Reset Attack on Video-Streaming Connections - TCP Session Hijacking Attack -Launching TCP Session Hijacking Attack - Creating Reverse Shell (10)
TRANSPORT LAYER SECCURITY: Overview of TLS - Overview of the TLS Handshake Protocol -Certificate Verification -Key Generation and Exchange - TLS Data Transmission - Sending and receiving Data with TLS Record Protocol -TLS Programming – Attacks on TLS (8)
FIREWALL : Introduction - Types of Firewalls - Building a Simple Firewall using Netfilter -The iptables Firewall in Linux - The structure of the iptables Firewalls -Traversing Chains and Rule Matching -Stateful Firewall using Connection Tracking- Application/Proxy Firewall and Web Proxy-Evading Firewalls - Using SSH Tunneling to Evade Firewalls - Dynamic Port Forwarding - Reverse SSH Tunneling (8)
Total L: 45+30=75
TUTORIAL PRACTICE:
• Packet Sniffing and Spoofing
• Linux VPN
• Vulnerabilities of TCP/IP protocols, as well as on attacks against these vulnerabilities
1. ARP poisoning
2. ICMP Redirect attack
3. SYN flooding attack
4. TCP RST Attacks on telnet and ssh Connections
5. TCP Session Hijacking
• Implementation of IPSec.
• Implement a simple personal Firewall
• Eavesdropping Attacks and its prevention using SSH
• Isolating WLAN Traffic using Separate Firewall for VPN Connection .Simulate using OPNET
• Network Intrusion detection
• Host based intrusion detection
TEXT BOOKS:
1. Behrouz A Forouzan, “Data Communications and Networking”, Tata McGraw Hill, 2017
2. Behrouz A Forouzan, “TCP/ IP Protocol Suite”, Tata McGraw Hill, 2017.
3. Wenliang Du, “Computers and Internet Security”, 2019
REFERENCES:
1. Kevin Fall R and Richard Stevens W, "TCP/IP Illustrated, Volume 1: The Protocols”, Addison-Wesley, 2011.
2. James F. Kurose, Keith Ross, “Computer Networking: A Top-Down Approach”, Pearson Addison-Wesley, 2017.
3. Douglas Comer, “Internetworking with TCP/IP”, Prentice Hall, 2015.
4. William Stallings, "Data and Computer Communications", Prentice Hall, 2014.
20XC52 WEB ENGINEERING
3 0 0 3
Prerequisites:
WEB APPLICATION TECHNOLGIES: Rest Architecture – RESTful APIs ,HTTPS- dynamic web intro-Web functionality – Encoding Schemes -Building web applications with JS – Web assembly- Functions in web assembly-The Owasp project : introduction to web applications security - threats and OWASP principles - introduction to secure design (7)
WEB APPLICATION ATTACKS:CROSS SITE REQUEST FORGERY-CSRF Attacks on HTTP GET and POST Services-Countermeasures-Cross-Site Scripting Attack-Preventing XSS attacks SQL INJECTION ATTACK-Launching SQL Injection Attacks-Countermeasures- Insecure Web Logic: Logic Flaws, HTTP Pollution, HTTP Parameter Tampering- Security issues in JS, Web Assembly (10)
BROWSER: general concepts, functionalities, browsers war - configuration (HTTP-cookies, contents, scripting, etc.) - WEB BROWSER ATTACKS- Code execution exploits in the browser-Code execution exploits in plug-ins-Man-in-the-middle attacks - browser security (add-ons, plugins, same-origin policy etc.) and secure browsing - Attacks on User Interfaces - Browser Design & Flaws- User Tracking, Browser Caching Flaws - Cookie Flaws. (9)
DOMAIN NAME SYSTEM (DNS) AND ATTACKS: How DNS works- DNS Attacks: Overview -Local DNS Cache Poisoning Attack - Launch DNS Cache Poisoning Attack - Targeting the Authority Section -Remote DNS Cache Poisoning Attack - The Kaminsky Attack-Reply Forgery Attacks from Malicious DNS Servers-DNS Rebinding Attack-Protection Against DNS Spoofing Attacks - DNSSEC - TLS/SSL Solution - Denial of Service Attacks on DNS Servers (9)
EMAIL SECURITY: SMTP - Email Security Policies - Email Security Best Practices- SMIME-Secure E-Mail Implementation (5)
PUBLIC KEY INFRASTRUCTURE: Attacks on PKI Infrastructure- Public Key certificates –Certificate Authority – How PKI defeats MITM –Types of digital certificates- LDAP and Enterprise Data Repository (5)
Total L:45
TEXT BOOKS:
1. Stuttard D and Pinto M, “The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws”, John Wiley & Sons, 2011.
2. LeBlanc J and Messerschmidt T, “Identity and Data Security for Web Development: Best Practices", O'Reilly Media, Inc, 2016.
REFERENCES:
1. Cross-Site Request Forgery - http://seclab.stanford.edu/websec/csrf/
2. Stanek, W. Web Applications, Security and Maintenance: The Personal Trainer for IIS 7.0 & IIS 7.5. RP Books and Audio, 2014.
3. Dixon, J, “Monitoring with Graphite: Tracking Dynamic Host and Application Metrics at Scale", O'Reilly Media, Inc, 2017.
20XC53 MACHINE LEARNING
3 2 0 4
Prerequisites:
INTRODUCTION: Machine learning – Types – Supervised learning, unsupervised, Reinforcement learning, semi supervised learning
SUPERVISED LEARNING: Regression – Linear – Polynomial – Multiple regression – Evaluation measures – Bias –variance – overfitting – under fitting – Regularization (8)
CLASSIFICATION : Linear classification – Logistic regression – linear discriminant analysis – Optimization – Convex set - Convex functions – Loss functions in machine learning - Gradient descent – variants – Perceptron - Support Vector Machines – Linear, Soft margin, Linearly non separable data - Kernel functions (10)
NEURAL NETWORKS :Multilayer perceptron - Back propagation – Training – Bayesian Classifier – Maximum A Posteriori estimate – maximum likelihood estimation - K nearest neighbour classifier (10)
DECISION TREES : Introduction – Purity measures – Entropy, cross entropy, information gain, gain ratio, Gini Index – Regression trees – ID3 – Pruning – Model selection – Bootstrapping and cross validation – Model evaluation – Performance Measures – Receiver operating characteristic curve (ROC) – AUC (8)
UNSUPERVISED LEARNING: Clustering –Types - K-means –Spectral clustering - Cluster validity measures – dimensionality reduction- PCA (Principal components analysis) - ICA (Independent components analysis) - Outlier analysis (5)
GRAPHICAL MODELS: Bayesian networks – Hidden Markov models (4)
Total L: 45+30=75
TUTORIAL PRACTICE:
1. Implement the following Classification algorithms on suitable security related datasets.
a. Naïve Bayes
b. LDA / QDA
c. SVM
d. K nearest neighbor
e. Multi layer Perceptron
f. Decision tree
2. Do tenfold cross validation experiments and statistical validation using t-test and ANOVA.
3. Apply clustering for image segmentation and image compression.
4. Apply Spectral clustering on data sets and visualization through plots
5. Apply PCA / LDA / Factor analysis on Iris data set, reduce the dimension and visualize the data .
TEXT BOOKS:
1. Christopher M Bishop, “Pattern Recognition and Machine Learning”, Springer, 2016.
2. Richard O Duda, Peter E Hart and David G Stork, “Pattern Classification (Digitized)”, John Wiley, 2012.
REFERENCES:
1. David Barber, “Machine Learning: A Probabilistic Approach”, http://www.idiap.ch/~barber, 2006.
2. Alpaydin Ethem, “Introduction to Machine Learning”, Massachusetts Institute of Technology Press, 2020.
3. Trevor Hastie, Robert Tibshirani and Jerome Friedman, “The Elements of Statistical Learning”, Springer, 2013.
20XC54 COMPILERS AND PROGRAM ANALYSIS
4 0 0 4
Prerequisites:
Introduction to formal languages:Introduction to grammars, Types of grammars, regular and context free grammars, Finite state automata, DFA and NFA. (5)
Introduction to compilers: Phases of compilers – compilers and interpreters –Lexical analysis – Specifications of tokens - Regular expressions (5)
Syntax analysis: Top-down Parsing – LL(1) parsing – LR(0), SLR(1) parsing – LALR and CLR(1) parsing – syntax directed definition (7)
Intermediate code generation: Syntax Tree, Three Address Code, Types and Declarations: Translation of Expressions, conditional statements, looping statements, break and continue statements, array indexing, function calls – Quadrules, Triples and Indirect triples – Flow-of-control statements (6)
Run-time environments: Storage Allocation – Activation Trees- Activation Records – Parameter Passing Methods – Data Access with and without Nested Proceedures – Heap Management – Garbage Collection (6)
Code generation: Issues in the design of code generation - Program and Instruction Costs – Static and Stack Allocation of addresses in Target Code – Producing Code generators automatically. (5)
Control and data flow analysis: Dominators and Postdominators – Loops and Strongly Connected Components – Reducibility – Iterative Data Flow Analysis – Lattices of flow functions – Control-Tree-based Data-flow analysis – Structural and Interval Analysis – Webs – Static Single-Assignment (SSA) Form (7)
Dependency analysis: Dependence Relations – Direction Vector - Basic Block Dependence DAGs – Dependence in Loops – Dependence Testing – Program-Dependence Graphs (5)
Code optimization and scheduling: Basic Blocks – Control Flow Graph – Value Numbering – Copy and Constant Propagation – Common Subexpression Elimination – Loop-invariant Code Motion - PeepHole Optimization – Instruction Scheduling – Software Pipeling (5)
Security analysis : Information flow, role of program analysis, applications, identifying string vulnerabilities, array out-of bound checks, null pointer analysis, dangling pointers, pointers beyond a range, type-based security, secure constructs and operations (4)
Total L:60
TEXT BOOKS:
1. Steven Muchnick, “Advanced Compiler Design Implementation”, Morgan Kaufmann, 2003.
2. Alfred Aho, Monica Lam, Ravi Sethi, Jeffrey Ullman, “Compilers: Principles, Techniques and Tools”, Pearson, 2014.
REFERENCES:
1. Khedker, Uday, Amitabha Sanyal, Bageshri Sathe, “Data flow analysis: theory and practice”, CRC Press, 2017.
2. Nielson, Flemming, Hanne R. Nielson, and Chris Hankin. Principles of program analysis. Springer, 2015.
20XC56 WINDOWS SYSTEM PROGRAMMING LAB
0 0 2 1
Prerequisites:
INTRODUCTION TO WINDOWS SYSTEM: System architecture and evolution - Features of an operating system: kernel, virtual memory, multitasking, multithreading, sharing of resources, synchronization, concurrence - Working with the console - Windows SDK and Visual Studio - Gcc compiler, gdb debugger.
WINDOWS API (Win32 and Win64 API): Creation and use of static and dynamic libraries - Basic data types - Tracking of system calls, reporting of errors, - Management of exceptions - Obtaining of system information - Register handling - 32 and 64 bit application handling - .NET Framework. Development of System Libraries.
PROCESSES AND THREADS: Development of processes and threads, child processes - User space and kernel space - Process states - Process management, process groups - Process priorities - Process statistics, timers - Process suspending, time management - Console applications - Windows services - Aspects of security: process rights.
SYNCHRONIZATION: The concept of race - Critical sections, deadlock – Mutex – Semaphores – Events. Inter-process communication: Anonymous and named streams - Message Queues – Mail slot mechanism - Other mechanisms (clipboard, events).
MEMORY: Memory access rights – Memory locking - Shared memory - Memory mapping.
OPERATIONS ON FILES: File system management - Write/read buffers - Symbolic and hard links - Temporary files - Asynchronous input/output - Aspects of security: file access rights.
NETWORK SERVICES: Client-service architecture - Winsock and Berkeley sockets - TCP socket programming - UDP socket programming - IPv4 and IPv6 protocol management.
PRACTICALS:
1. Develop, debug, and test Windows application programs using current Microsoft Visual Studio versions.
2. Usage of basic I/O, including the file and console I/O, along with file and directory management and registry programming.
3. Usage of structured exception handling (SEH) to simplify programming and increase reliability.
4. Usage of memory management and memory-mapped files to improve performance and share memory between processes.
5. Understand process management and inter-process communication using pipes.
6. Create networked client/server applications using named pipes as well as Windows Sockets.
7. Manage and synchronize threads using mutexes, semaphores, events, CRITICAL_SECTION objects, slim reader/writer (SRW) locks, and condition variables.
8. Usage of Windows services to deploy manageable server systems.
9. Securing Windows objects.
10. Develop dynamic link libraries (DLLs) that can be shared by multiple processes and loaded dynamically at run time.
Total P: 30
TEXT BOOKS:
1. Johnson M. Hart, “Windows System Programming”, Addison-Wesley, 2010.
2. Johnson M. Hart, “Win32 System Programming: A Windows 2000 Application Developer's Guide”, Addison-Wesley, 2001.
20XC57 WEB ENGINEERING LAB
0 0 4 2
1. Web application security testing against known attacks.
2. Exercise to practice protocol stack and status code.
3. Client side vulnerabilities – Parameter tampering, Browser attack
4. Cross site scripting - Sanitizing User Input
5. Whitelist validation to prevent Command Injection
6. Preventing Automated threats (Account aggregation, carding, scraping, Denial-of-Service )
7. Server side vulnerabilities - Directory traversal Attack, vulnerability scanner
8. Penetration Testing
9. Case study Study on Spambots
Total P: 60
20XC58 ETHICAL HACKING LAB
0 0 4 2
Prerequisites:
INTRODUCTION TO HACKING : Introduction to Hacking – Importance of Security – Elements of Security – Phases of an Attack – Types of Hacker Attacks – Hacktivism – Vulnerability Research – Introduction to Footprinting – Information Gathering Methodology – Footprinting Tools – WHOIS Tools – DNS Information Tools – Locating the Network Range – Meta Search Engines.
SCANNING AND ENUMERATION : Introduction to Scanning – Objectives – Scanning Methodology – Tools – Introduction to Enumeration – Enumeration Techniques – Enumeration Procedure – Tools.
SYSTEM HACKING: Introduction – Cracking Passwords – Password Cracking Websites – Password Guessing – Password Cracking Tools – Password Cracking Counter measures – Escalating Privileges –Executing Applications – Keyloggers and Spyware.
VULNERABILITY ANALYSIS : Vulnerability Assessment Concept - Life-Cycle - Vulnerability Assessment Solutions - Vulnerability Scoring Systems - Vulnerability Scanning - Nessus Tool - Windows OS Vulnerabilities – Tools for Identifying Vulnerabilities – Countermeasures – Linux OS Vulnerabilities – Tools for Identifying Vulnerabilities – Countermeasures.
SOCIAL ENGINEERING AND DENIAL-OF-SERVICES : Social Engineering – Concepts - Phases of a Social Engineering Attack - Types of Social Engineering- Insider Attack- The process of Identity theft- Social Engineering Countermeasures – DoS/DDoS - Attack Techniques - Basic Categories - Botnets - Other DDoS Attack tools - countermeasure Strategies
PRACTICALS:
1. Maltego Tool, Recon-ng Overview, FOCA Tool Overview Countermeasures of Footprinting
2. Gathering information using Windows Command Line Utilities, Downloading a Website using Website Copier tool (HTTrack), Gathering information using Metasploit
3. Creating Network Topology Map using Tool Prepare Proxies
4. Services Enumeration using Nmap NetBIOS Enumeration NetBIOS Enumeration Tool
5. Enumeration using SuperScan Tool Enumerating Shared Resources Using Net View
6. Enumeration using SoftPerfect Network Scanner Tool
7. Vulnerability Scanning using Nessus Vulnerability Scanning Tool
8. Password Cracking using Pwdump7 and Ophcrack tool.
9. NTFS Stream Manipulation
10. Image Steganography Covering Tracks
11. Clearing Audit Policies, logs on Windows and clearing logs on Linux
12. HTTP RAT Trojan
13. To Defend Against DNS Spoofing Sniffing Tools - Wireshark
14. Social Engineering using Kali Linux
Total P: 60
REFERENCES:
1. Ec-Council, “Ethical Hacking and Countermeasures: Attack Phases”, Delmar Cengage Learning, 2009
2. Michael T. Simpson, Kent Backman, James E. Corley, “Hands-On Ethical Hacking and Network Defense”, Cengage Learning, 2012.
3. Patrick Engebretson, “The Basics of Hacking and Penetration Testing – Ethical Hacking and Penetration Testing Made Easy”, Syngress Media, 2013.
4. Jon Erickson, “Hacking: The Art of Exploitation”, No Starch Press, 2008.
5. RafayBaloch, “Ethical Hacking And Penetration Testing Guide”, CRC Press, Taylor & Francis Group,2015
20XC61 CLOUD SECURITY
3 0 0 3
Prerequisites:
INTRODUCTION TO PARALLEL AND DISTRIBUTED COMPUTING: Introduction, Architecture and Distributed computing models and technologies SOA, Web Services (4)
GRID, CLUSTER AND UTILITY COMPUTING Introduction, Architecture, Pros & Cons, Real time applications.(2)
INTRODUCTION TO CLOUD COMPUTING: Definition, History, Comparison of Cloud Computing with Grid, Cluster and Utility Computing, Deployment models – Private, Public, Hybrid and Community - Pros and Cons of Cloud Computing. SaaS, PaaS, IaaSetc,. (5)
VIRTUALIZATION AND CONTAINERS: Types of Virtualization, Tools for Virtualization, Architecture of VMM, Virtualization for Cloud, Container Technology (5)
MAP REDUCE PARADIGMS: ntroduction, GFS Architecture, HDFS Architecture, Hbase, Google big Table, Amazon’s (key value) pair storage and Microsoft’s Azure infrastructure, Map reduce programming examples (5)
CLOUD COMPUTING FRAMEWORK AND APPLICATIONS Amazon EC2, S3 storage services, Distributed search engine and distributed data mining in the cloud. (2)
SECURITY PATTERNS FOR CLOUD COMPUTING Trusted Platform Geo-tagging, Cloud VM Platform Encryption, Trusted Cloud Resource Pools, Secure Cloud Interfaces, Cloud Resource Access Control, Cloud Data Breach Protection, Permanent Data Loss Protection, In-Transit Cloud Data Encryption, Security Patterns for Cloud Computing – Network Security, Identity & Access Management (7)
CLOUD SECURITY: Concepts of security, Threats and Risk analysis, Attacks in cloud, STRIDE model, Infrastructure security Cloud security, regulatory mandates, audit policies and compliance requirements y guidelines prescribed by NIST, Cloud Security Alliance and ENISA, Virtualization and Container security. (8)
ADVANCED CLOUD SECURITY: Trustworthy cloud infrastructures, Differential privacy, secure computations, High-availability and integrity layer for cloud storage, Homomorphic encryption, , Cloud forensics. (7)
Total L:45
TEXT BOOKS:
1. Vic (J.R.) Winkler, “Securing the Cloud: Cloud Computing Security Techniques and Tactics”, Syngress / Elsevier, 2011.
2. Thomas Erl, “Cloud Computing Design Patterns”, Prentice Hall, 2015.
REFERENCES:
1. Liu M L, “Distributed Computing Principles and Applications”, Pearson Education, 2009.
2. Dean J, Ghemawat S, “MapReduce: Simplified Data Processing on Large Clusters” OSDI, 2004.
3. Brian T. O'Hara, Ben Malisow, “CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide”, Wiley, 2017.
4. Rajkumar Buyya, Christian Vecchiola, S.ThamaraiSelvi, “Mastering Cloud Computing”, Morgan Kaufman, 2013.
5. Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing”, 2011.
20XC62 UBIQUITOUS COMPUTING
3 2 0 4
Prerequisites:
WIRELESS NETWORK OVERVIEW: Wired and wireless Networks- Effect of mobility on systems- Introduction to wireless technologies- RF Overview - Wireless Signal Propagation-Signal-to-Noise Ratio – Modulation - ISM Spectrum - Frequency Hopping Spread Spectrum (FHSS) - Direct Sequence Spread Spectrum (DSSS)- Orthogonal Frequency Division Multiplexing (OFDM) -Coordination mechanisms and MAC protocols for multi-user network access (6)
WIRELESS THREATS AND RISKS: Security breaches on wireless Networks- Eavesdropping-Jamming - RF interference -Covert wireless channels-Traffic Analysis Spoofing- DOS attack - Malicious Code -Cryptographic threats (4)
WIRELESS LOCAL AREA NETWORK (WLAN): IEEE 802.11 Standard-SSID- 802.1x – WPA -WPA2- WEP (wired Equivalence Privacy - WLAN Security Architectures-Authentication - WPA and 802.1x Vulnerabilities - Authentication Server- (RADIUS)- Extensible Authentication Protocol (EAP)- RADIUS Vulnerabilities-Rogue Access Points Detection-MAC Filtering Attacks - Attack on MiC - Wireless VPN Architecture Overview (8)
WIREELSS DATA NETWORKS: RFID – NFC - Low Power Personal Area networks (LowPAN): Overview, 6LowPAN, IEEE 802.15.4, BLE, Zigbee, Zwave, and Thread - Wi-Fi - Low Power Wide Area Networks (LPWAN): Concepts and features, SigFox, LoraWAN, LPWAN-3GPP - Comparing different LPWAN technologies. (10)
SECURITY IN WIREELSS DATA NETWORKS: Wireless Device security issues -- End-to-End Security-RFID Security - Security architecture in Bluetooth Networks, Sensor networks, Security Issues in ZigBEE:-BLE Security: Threats to BLE Devices and Networks -Architecture and Protocols for AAA in the Future Wireless Communications Networks. (9)
IoT ARCHITECTURE: IoT Enabling Technologies- Components of IoT – IPV6 – CoAP: Architecture, Features, Applications - MQTT: Architecture- Security in IoT:–Eavesdropping Attacks, Encryption Attacks –– Blockchain in IoT security. (8)
Total L: 45+30=75
TUTORIAL PRACTICE:
1. Study of OMNET++/NS-2 simulator.
2. Simulation of a IEEE 802.11 LAN under various conditions using chosen simulator.
3 .Simulation of different routing protocols using simulators.
4. Simulation of TCP over error-prone wireless network using simulator
5. Study of wireless vulnerabilities and attacks under 802.11 standard
6. Development of Mobile application using blue tooth.
7. Simulating Wireless Sensor Networks
8. Study of security attacks in ZigBee, Blutooth networks
9. Smart Home applications using Rasperry PI
10. IoT security applications
TEXT BOOKS:
1. Lei Chen, JiahuangJi, Zihong Zhang, Wireless Network Security, Springer Science & Business Media,2013
2. HakimaChaouchi, Maryline Laurent, Maknavicius,” Wireless and Mobile Network security”, 2010.
3. Brian Russell, Drew Van Duren, "Practical Internet of Things Security", Packt Publishing, 2016
4. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John Wiley and Sons Ltd, UK, 2014.
5. Aaron E. Earle,”Wireless Security Handbook” ,Taylor & Francis Group, LLC,2006
REFERENCES:
1. William Stallings, “Cryptography and Network Security, Principles and Practices”, Pearson education; 2016.
2. LeventeButtyán and Jean-Pierre Hubaux, Security and Cooperation in Wireless Networks, 2008.
3. James Kempf, Wireless Internet Security: Architectures and Protocols, 2008
4. Merritt Nichols and Lekka, “Wireless Security-Models, Threats and Solutions”, McGraw – Hill, 2002.
20XC63 CYBER SECURITY ANALYTICS
3 0 0 3
Prerequisites:
INTRODUCTION: Motivation for Data Mining – Importance – Definition – Kinds of data for Data Mining – Data Mining functionalities – Patterns – Classification of Data Mining Systems – Major issues in Data Mining-Overview of Data Mining Techniques. Data preprocessing: Types of data, Data cleaning-Smoothing, Handling missing values- Feature subset selection –Chi square and Information Gain- Sampling methods- Successful ML applications in Cyber security-Preprocessing raw security data for data mining and feature engineering (10)
MINING FREQUENT PATTERNS, ASSOCIATIONS AND CORRELATIONS: Basic concepts – Efficient and Scalable Frequent Itemset Mining methods – Apriori, FP Tree (5)
CLASSIFICATION AND CLUSTERING: Overview of Classification techniques –Ensemble Learning-bagging, boosting, cascading, stacking – Clustering - density based clustering- Hierarchical clustering – Case studies like encrypted traffic classification ,clustering user activity to detect DDOS attacks and mass exploitation - ANOMALY DETECTION: Network Anomaly Detection – Detecting anomalous user behavior (10)
TEXT MINING: Statistical Characteristics of Text: Zipf's law, Simple tokenizing, stop-word removal, and stemming; inverted indices, TF-IDF (term frequency/inverse document frequency) weighting - cosine similarity, Text Categorization: Rocchio; Naïve Bayes, Web Mining: Link analysis: Hubs and Authorities, PageRank- Text mining in cybersecurity (8)
MINING DATA STREAMS: Challenges- Characteristics of Streaming Data, Issues and Challenges, Streaming Data Mining Algorithms, Any time stream Mining – Identifying emerging class/patterns in streaming data- Applications in intrusion detection, insider threat detection, website fingerprinting, and textual stream (6)
VISUAL SECURITY ANALYSIS: Traffic monitoring and analysis – Firewall log analysis – Email data analysis – Vulnerabilty data visualization – Insider threat visualization – Data visualization tools (6)
Total L:45
TEXT BOOKS:
1. Jiawei Han and Micheline Kamber , “Data Mining – Concepts and Techniques”, Morgan Kaufmann Publishers, 2012.
2. Tan, Steinbach and Kumar, “Introduction to Data Mining”, Pearson Education, 2014.
3 . Dua, Sumeet, and Xian Du. “Data Mining and Machine Learning in Cyber Security”, CRC press, 2016.
4. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, “Introduction to Information Retrieval”, Cambridge University Press, 2012
REFERENCES:
1. Jacobs Jay and Bob Rudis, “Data Driven Security Analysis, Visualization, and Dashboards”, John Wiley & Sons, 2014.
2. Stolfo, Salvatore J., Bellovin S M, Hershkop S., Keromytis, A.D., Sinclair S, Smith.S, “Insider Attack and Cyber Security: Beyond The Hacker”, Springer, 2008.
3. Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. “Network Anomaly Detection: A Machine Learning Perspective”, CRC Press, 2013.
4. Marty, Raffael, “Applied security visualization”, Upper Saddle River: Addison-Wesley, 2009.
20XC64 SECURE CODING
3 2 0 4
Prerequisites:
INTRODUCTION: The Need for Secure Systems, Trustworthy Computing, The Attacker’s Advantage and the Defender’s Dilemma, Vulnerability Cycle, Principles of Security Architecture, Java Sandbox (6)
SOFTWARE DEVELOPMENT PROCESS : Proactive Security Development Process, Secure Software Development Cycle, Security issues while writing SRS, Process Improvements, Design Phase, Development Phase, Test Pha se, Shipping and Maintenance Phases, Security Principles, Secure Product Development timeline (12)
THREAT MODELING : Secure Design Through Threat Modeling, Decompose the Application, Determine the Threats to the System, Rank the Threats by Decreasing Risk, Choose How to Respond to the Threats, Choose Techniques to Mitigate the Threats, Security Techniques, Authentication, Authorization, Tamper-Resistant and Privacy-Enhanced Technologies, Encryption, Hashes, MACs, and Digital Signatures, Auditing, Filtering, Throttling, and Quality of Service, Least Privilege (8)
SECURE CODING TECHNIQUES: Buffer Overrun, Stack Overruns, Heap Overruns, Array Indexing Errors, Format String Bugs, Preventing Buffer Overruns (7)
ACCESS CONTROL: Determining Appropriate Access Control, Running with Least Privilege (5)
CRYPTOGRAPHY CODING: Poor Random Numbers, Using Passwords to Derive Cryptographic Keys, Key Management Issues, Creating Your Own Cryptographic Functions, Protecting Secret Data, Creating a Salted Hash (8)
CANONICAL REPRESENTATION: Canonical Filename Issues, Canonical Web-Based Issues, Preventing Canonicalization Mistakes, Web-Based Canonicalization Remedies (7)
DENIAL OF SERVICE: Protecting Against Denial of Service Attacks, Application Failure Attacks, CPU Starvation Attacks, Memory Starvation Attacks, Resource Starvation Attacks, Network Bandwidth Attacks (7)
SECURITY TESTING: Building Security Test Plans from a Threat Model, Testing Clients with Rogue Servers, Testing with Security Templates, Test the End-to-End Solution, Determining Attack Surface, Risk Assessment Methodologies (8)
MAINTENANCE: Performing a Security Code Review, Secure Software Installation, Building Privacy into Your Application, Writing Security Documentation and Error Messages (6)
Total L: 45+30=75
TUTORIAL PRACTICE:
1. Implementation of buffer overrun
2. Implementation of stack overrun
TEXT BOOKS:
1. Michael Howard, David LeBlanc, "Writing Secure Code", Microsoft Press, 2003.
2. Robert C. Seacord, "Secure Coding in C and C++: Secure Coding in C and C++", Addision Wesley, 2013.
3. Kenneth van Wyk, Mark Graff, "Secure Coding: Principles and Practices", O'Reilly Media, 2009.
REFERENCES:
1. C. Warren Axelrod, "Engineering Safe and Secure Software Systems", Artech House, 2012.
20XC66 CLOUD SECURITY LAB
0 0 2 1
1. Simulating brute force attack to crack a password protected cloud network
2. Demonstrate Web browser attack and malware injection attack on cloud systems
3. Simulate DDoS attacks to exhaust server resources
4. Detecting side-channel attacks in multi-tenant cloud systems
5. Detecting cryptojacking attacks in cloud systems
6. Simulating cross-site scripting attacks on cloud systems
7. Simulating and preventing virtual machine hyper jumping
8. Demonstrating and preventing man-in-the-middle attacks, spectre and meltdown attacks
9. Analyzing CPU cache exploit in multi-tenant cloud environment
10.Demonstrate homomorphic encryption in securing cloud systems
Total P: 30
20XC67 CYBER SECURITY ANALYTICS AND VISUALIZATION LAB
0 0 4 2
1. Getting to know your Data – Feature Selection
2. Building a machine learning Intrusion Detection System (IDS)
3. Malware analysis and classification.
4. Unsupervised anomaly detection
5. Handling massive data using map reduce
6. Visualize data of firewall logs, email data, social network data, intrusion detection data. Familiarise with ELK stack
7. Package using data mining techniques preferably research papers.
Total P: 60
20XC68 DISTRIBUTED ENTERPRISE COMPUTING LAB
0 0 4 2
DISTRIBUTED MULTI-TIER COMPUTING: Introduction – Basis of distributed computing - Centralized vs Distributed systems – Distributed operation system – Single System image – transparencies– decomposition approaches – layers and tiers.
CLIENT/SERVER COMPUTING: Approaches to client server computing –enterprise architectural overview - component based software development for enterprise – java enterprise system - operating system services for client – server types – server side scripting – operating system services for server – client and server software requirements
MIDDLEWARE: Architecture – classification of middleware – database middleware – drivers, connection, statements - communication middleware – transaction middleware – isolation – interfacing.
ENTERPRISE WEB COMMUNICATION: Java servlets – HTTP Servlet, generic servlets, Java server pages – elements of JSP – JSTL.
MULTI-TIER ENTERPRISE COMPUTING: Middleware services – development and deployment - Enterprise Java Beans – types – lifecycle – entities – POJO – POJI – Java persistent query language - accessing ejbs using JSP – XML processing APIs
DISTRIBUTED ENTERPRISE COMMUNICATION:>RMI – CORBA – DCOM – Java Messaging Service – Message oriented middleware services – publish/subscribe messaging – AJAX – JSON
JAVA WEB SERVICES: Web service standards – Describing and publishing – JAX-WS – SOAP
DISTRIBUTED ENTERPRISE SYSTEMS: Services using EJB: Naming Services, Directory and Trading services, Activation Services, Transaction Services, Security Services
FRAMEWORKS: NStruts - Java Server Faces – Spring – Hibernate – Ruby on Rails
PRACTICALS:
1. Develop a host application and install it in another system.
2. Convert the developed application to two, three and multi-tiered application using the latest front and back end technologies.
3. Migrate the application to distributed environment.
4. Demonstrate the communication between the tiers using interfaces.
5. Session beans.
6. Entity and Message Driven Beans.
7. RMI communication between two applications.
8. Web Service with its client.
9. Conversion of entity bean to web service.
10. Java Transaction API.
11. Application using any one of the frameworks.
Total L: 60
TEXT BOOKS:
1. Robert Orfali, Dan Harkey and Jeri Edwards, “Client / Server survival Guide”, Wiley, 2011.
2. Rima Patel Sriganesh, Gerald Brose and Micah Silverman, Mastering Enterprise JavaBeans 3.0”, Wiley, 2006.
3. Rod Johnson, Juergen Hoeller, Alef Arendsen, Thomas Risberg and Colin Sampaleanu, “Professional Java Development with the Spring Framework”, Wiley, 2008.
REFERENCES:
1. George Reese, “Database programming, with JDBC and Java", O’Reilly, 2013.
2. Dustin R. Callaway, "Inside Servlets " Pearson Education, 2009.
3. Sam Ruby, Dave Thomas, David Heinemeier Hansson, “Agile Web Development with Rails (Pragmatic Programmers)”, Pragmatic Bookshelf, 2011.
4. Dave Minter, Jeff Linwood, ““Beginning Hibernate: From Novice to Professional”, Apress, 2010.
5. Ted Husted, Cedric Dumoulin, George Franciscus, David Winterfeldt, Craig R McClanahan, “Struts in Action: Building Web Applications with the Leading Java Framework”, Manning Publications, 2006.
6. Craig Walls and Ryan Breidenbach, “Spring in Action”, Dreamteach, 2008.
7. Mike Keith, Merrick Schincariol, “Pro EJB 3: Java Persistence API ( Experts Voice in Java)”, APress, 2006.
20XCP1 PROJECT WORK II – INDUSTRY / RESEARCH PROJECT
20XC81 SOFTWARE SECURITY AND EXPLOITATION
3 0 0 3
Prerequisites:
LINUX DEBUGGING SUPPORT: The Kernel Execution and Programming Context - Introduction to Linux kernel exploits - Kernel debugging - GDB scripting engine and developing helper scripts - Dynamic debugging with kprobes / jprobes – Dtrace: programming, implementation/design, internals - /proc internals - Path of packet through kernel. (8)
LINUX EXPLOITATION TECHNIQUES:Architecture-specific exploitation techniques - Fixating the system and recovering the kernel state - Information leaks (environment and code-based) - Out of bounds (OOB) access vulnerabilities - Integer vulnerabilities (signedness, typecasting, overflows). (8)
ROP, ASLR and DEP: Race conditions and Privilege escalation techniques - Read/write (controlled, partially-controlled and uncontrolled) primitives and ret2usr attacks - Stack smashing – ret2libc attacks - Heap vulnerabilities (heap overflows, UAF, off-by-X) – Supervisor Mode Execution Protection / Access Protection / Kernel Page Table Isolation bypasses - Current UAF exploitation countermeasures and bypasses - Universal heap sprays - Double fetches - Latest kernel exploitation mitigations – Return Oriented Programming (ROP), Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP). (8)
WINDOWS KERNEL DEBUGGING AND EXPLOITATION: Understanding the Windows kernel - Navigating the Windows kernel - Modern kernel protections - Debugging the Windows 10 kernels and drivers – WinDbg - Analyzing kernel vulnerabilities and vulnerability types - Kernel exploitation techniques - Token stealing and information disclosure vulnerabilities. (7)
WINDOWS EXPLOITATION: Fuzzing – Triggering the vulnerability - Crafting the attack string - Return to stack vs Return through registers - Windows Egg Hunting - Function pointer overwrites Windows Heap Spraying – Kernel Pool Exploitation – Windows Shellcode - Exploiting with Structured Exception Handlers (SEH) - Advanced stack-smashing on Windows – Using Windows ROP - Building ROP chains to defeat DEP and bypass ASLR - Metaspoilt Exploit. (6)
OFFENSIVE POWERSHELL: Powershell fundamentals - Downloading and execution of payloads and scripts - Obfuscation, Information Gathering, and Post-Exploitation(Information Gathering and Exfiltration, Backdoors, Privilege Escalation, Getting system secrets, Passing the hashes/credentials, PowerShell Remoting, WMI and WSMAN for remote command execution, Web Shells, Achieving Persistence) – Powershell and Metaspoilt - “Living Off The Land” concept - Powershell pentesting frameworks and tools including, Nishang, PowerSploit, and Empire - mimikatz, privsec, persistence, lateral movement - Powershell log analysis, malicious cases with Powershell (scheduled tasks, jobs, HIDs). (8)
Total L:45
TEXT BOOKS:
1. Yang Lixiang, Liang Wenfeng, “The Art of Kernel Linux design”, CRC Press, 2016
2. Phil Bramwel, “Hands-On Penetration Testing on Windows”, Packt, 2018.
3. David das Neves, Jan-Hendrik Peters, “Learn PowerShell Core 6.0: Automate and Control Administrative Tasks using DevOps Principles”, Packt, 2018.
4. Enrico Perla, Massimiliano Oldani, “A Guide to Kernel Exploitation: Attacking the Core”, Syngress, 2011.
REFERENCES:
1. Wenliang Du, “Computer Security – A Hands-on Approach”, CreateSpace, 2017.
2. Balapure,“Learning Metaspoilt Exploitation and Development”, Packt, 2013
3. Joel Scambray, Stuart McClure,“Hacking Exposed Windows: Windows Security Secrets and Solutions”, McGrawHill, 2012.
20XC82 MOBILE SECURITY
3 0 0 3
Prerequisites:
FUNDAMENTALS OF ANDROID INTERNALS: The Android Architecture - Anatomy of Android Application - Android Packages (APK), Application Components, JNI – Android IPC – Android Framework Services- Application Internals – Dalvik Internals – Android Run Time (ART) Internals – Android Partitions and File Systems. (5)
INTRODUCTION TO ANDROID SECURITY: Mobile application threat model - What makes mobile application security so different? - The Android Linux OS security - The Android security mechanisms - Application file system isolation & insecure file access - The permission model - Database isolation - The Android emulator Vs Physical device - The debug bridge - Rooting. (7)
STATIC ANALYSIS – REVERSE ENGINEERING AND PATCHING THE APPLICATION BINARIES: The APK file package - APK extraction - Investigating layout, manifest, permissions and binaries - Extracting the content of the classes.dex file - Using smali/baksmali Dalvik assembler/disassembler - Decompilation - Using dex2jar - Reverse engineer the app and change its behavior - Decompile / disassemble the dex classes using smali/baksmali - Code patching - Modifying the code - Recompile - Resign the APK. Device Rooting. (7)
APPLICATION DYNAMIC RUNTIME ANALYSIS: Monitoring process activity - Observing file access - Monitoring network connectivity - Analyzing logs using logcat - Memory dumps and analysis – Smali Debugging - Setting breakpoints - Native debugging with IDA (building signatures, types etc.) - Runtime instrumentation and manipulation using ReFrameworker. (7)
TRAFFIC ANALYSIS AND MANIPULATION: Common vulnerabilities related to traffic -Proxies and sniffers - Sensitive information transmission -Importing SSL certificates & trusted CA's - Bypassing server certificate validations - Exposing insecure traffic -Validating server certificates and avoiding man-in-the-middle -SSL Pinning -Using the HostnameVerifier class - Using SSL with the HttpsURLConnection class -Client-side certificate authentication. (7)
COMPONENT & IPC SECURITY: Major component types – Activity, Service, Content provider, Broadcast receiver - The intent structure - The intent filter -Component permissions and visibility -Authenticating Callers of Components -Binder interface -Pending intents -Direct component invocation by unauthorized apps - Unprotected content providers -Sticky broadcasts -Securely activating components - Avoiding access to restricted screens. (7)
IDENTIFYING CODE LEVEL VULNERABILITIES & DEVICE AND DATA SECURITY: Verifying caller identity -Whitebox approach -using a code review - Locating interesting code - Detecting common code level vulnerabilities - Using Lint. Data Storage – Device Administration API – Third Party Code – Device Tracking. (5)
Total L:45
TEXT BOOKS:
1. Jonathan Levin, “Android Internals – A Confectioners Cookbook, Volume II – The Developer’s View”, 2017.
2. Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, “Hacking Exposed: Mobile Security Secrets and Solutions”, McGraw Hill, 2013.
3. Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski, “Android Hacker's Handbook”, Wiley, 2014.
REFERENCES:
1. Nikolay Elenkov, “Android Security Internals: An In-Depth Guide to Android's Security Architecture”, No Starch Press, 2014.
2. Androulidakis, “Mobile Phone Security and Forensics: A Practical Approach”, Springer, 2012.
20XC83 DATA PRIVACY
3 0 0 3
Prerequisites:
INTRODUCTION: Foundations of privacy :Conceptual framework - Fair information principles, Privacy and Contextual Integrity, Privacy regulations, Goals of Privacy engineering, taxonomy of privacy, Privacy engineering development process- Importance of Privacy Framework- General Data Protection Regulation (GDPR)- Attacks on private data (8)
DATA PRIVACY MODELS AND DISCLOSURE RISK MEASURES: Formal model of Data privacy, K-anonymity: Definition of k-anonymity, Practical Implications, Mechanism design, Differential Privacy: Definition of Differential Privacy (DP), Privacy and databases, Promise of DP, Formalizing DP, Lower bounds, Mechanism Design, Machine learning and Differential Privacy, Disclosure Risk Measures: Attribute disclosure, identity disclosure, Evaluating the risk of disclosure - Limitations of K-anonymity, A statistical framework for Differential Privacy- DP for graphs & social networks, Weakness of Differential Privacy (10)
MASKING METHODS: Perturbative methods - Non-Perturbative methods - Synthetic Data Generators - Masking methods - Data protection procedures for constrained data - masking methods and Big data (8)
PRIVACY ENGINEERING PROCESS: Developing Privacy Policies - Elements of Privacy Engineering Development - Designing a Privacy Policy - Developing Privacy Engineering requirement - Privacy Requirements Engineering - Privacy Engineering Lifecycle Methodology (6)
ORGANIZING FOR THE PRIVACY: Privacy Responsibilities - Privacy Awareness - Readiness Assessment - Building Operational Plan - Building Communication and Training plan (4)
LEARNING WITH PRIVACY: Privacy Leakage in Machine Learning - Bias in Algorithms -Existence and Detection - Fairness in ML- Privacy Compliance in Big Data Systems (7)
CASE STUDIES: Tracking using cookies, linkage attacks, DP in biomedical datasets (2)
Total L:45
TEXT BOOKS:
1. Michelle Dennedy, Jonathan Fox, Tom Finneran, "The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value", Apress, 2014.
2. Vicenc Torra, "Data Privacy: Foundations, New Developments and Big Data Challenge", Springer, 2017.
3. Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu, "Differential Privacy and Applications", Springer, 2017.
REFERENCES:
1. Ian Oliver, "Privacy Engineering: A Data Flow and Ontological Approach", CreateSpace Independent Publishing Platform, 2014.
2. Cynthia Dwork, Aaron Roth, "The Algorithmic Foundations of Differential Privacy", Now Publishers, 2014.
20XC86 SOFTWARE SECURITY AND EXPLOITATION LAB
0 0 4 2
Prerequisites:
LINUX EXPLOIT DEVELOPMENT
1. Hidden Function
2. Set-UID Privileged Programs
3. Race Condition Vulnerability
4. Shellshock Attack
5. Linux Basic Stack Overflow
6. Strict Firewall Bypass (Format String Exploitation + Socket Reuse Shellcode)
7. Linux NX Bypass (ret2libc)
8. Linux x64 NX Bypass (ret2libc + ROP)
9. Linux NX & ASLR Bypass (Format String Exploitation + ROP)
10. Linux Shellcoding
11. Overcome ret2libc Limitations
WINDOWS EXPLOIT
1. Windows Basic Stack Overflow
2. Windows SEH Overflow
3. Windows Egghunting
4. Windows Shellcoding
5. Fuzzing Windows Software
6. Windows ROP
7. Write Metaspoilt Exploit
8. Leveraging PowerShell During Exploitation
9. PowerShell for Post-exploitation and Lateral Movement
10. Working with several powershell pentesting frameworks and tools including - Nishang, PowerSploit, and Empire
Total P: 60
20XC87 MOBILE SECURITY LAB
0 0 4 2
1. Android Emulator, ADB and Database Isolation
2. Build your own malware app and steal other app files
3. Recovering protected secrets
4. Application patching
5. Memory dumps and objects analysis
6. Smali Debugging
7. Parameter Manipulation
8. Bypassing SSL Pinning
9. Invoking components using malicious intents
10. Dynamically registered components
11. Security code review
12. Android Repackaging Lab – Insert malicious code inside an existing Android app and repackage it.
13. Android Rooting Lab – Develop an OTA package from scratch to root an Android device.
Total P: 60
20XC87 MALWARE ANALYSIS LAB
0 0 4 2
Prerequisites:
INTRODUCTION: Malware - Types of malware, Malware history, Malware Behaviour, Spreading techniques- Social engineering, Using worms, Mass email campaign, Real world scenario, Attack scenarios, Obfuscation - Types of obfuscation, Obfuscation techniques.
GOALS: The Goals of Malware Analysis-Malware Analysis Techniques-Basic Static Analysis: Antivirus Scanning: A Useful First Step, Hashing: A Fingerprint for Malware, Finding Strings, Packed and Obfuscated Malware, Portable Executable File Format, Linked Libraries and Functions.
DOCUMENT FORMAT ANALYSIS: General Approach to Document Analysis, analyzing malicious documents, such as Microsoft Office, RTF and Adobe Acrobat (PDF) files. Case study on various open source Document Analysis Tools.
STATIC MALWARE ANALYSIS: Win32 Platform Overview, Platform Components Overview, Process Tracing and Analysis Tools, API Hooking Techniques, Debugging Tools for Windows, Scripted Debugging, x86 disassembly.
DYNAMIC MALWARE ANALYSIS: Indicators of Compromise (IOC's) such as file hashes, domain names, network traffic, strings, registry keys, files names, file paths, process names, URLs and IP addresses, Sandboxes, Running Malware, Monitoring with Process Monitor, debugging, exceptions, OllyDbg.
ANTI-REVERSE ENGINEERING: Anti-disassembly, anti-disassembly techniques Obscuring Flow Control, Anti-debugging technique.
CASE STUDIES: Case studies with different families of recent malwares.
Total P:60
TEXT BOOKS:
1. Michael Sikorski and Andrew Honig, “ Practical Malware Analysis”, No Starch Press,2012
2. Dang, Gazet, Bachaalany, “Practical Reverse Engineering”,Wiley,2014
3. Yin, Heng, Dawn Song. “Automatic Malware Analysis: An Emulator Based Approach”, Springer Science & Business Media, 2012.
REFERENCES:
1. Jamie Butler, Greg Hoglund, “Rootkits: Subverting the Windows Kernel”, Addison- Wesley, 2005
2. Elisan, Christopher C, “Advanced malware analysis”, McGraw Hill Professional, 2015.
3. Sikorski, Michael, Andrew Honig, “Practical Malware Analysis: The hands-on guide to dissecting malicious software”, NoStarch Press, 2012.
4. Reverend Bill Blunden, “The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System”, Jones & Bartlett, 2012.
5. Eilam, Eldad, “Reversing: Secrets of Reverse Engineering”, John Wiley & Sons, 2011.
20XC91 THREAT HUNTING
3 0 0 3
Prerequisites:
INTRODUCTION TO THREAT HUNTING: Need for threat hunting - Incident Response - Incident Response Process - Incident Response & Hunting - Risk Assessment & Hunting - Hunting mindset: Threat Intelligence - Using threat intelligence to hunt - Hunter mindset: Forensics - Using digital forensics to hunt - Intelligence Simulation - APT (Advanced Persistent Threat) - TTP (Tools, Tactics, and Procedures) - Pyramid of Pain - The Cyber Kill Chain Model - The Diamond Model - Ad hoc vs. Systematic approach for Threat Hunting. (6)
INTRODUCTION TO SECURITY OPERATIONS CENTER (SOC) & CLOUD SOC:The Importance of Building a Security Operations Center - SOC Functions - Optimizing a security operations model - Benefits and Challenges of Cloud Applications - Problems CloudSOC Solves - CloudSOC tools, information sources, and traffic flows. Understanding the CloudSOC data protection workflow - Using CloudSOC to control data exposure - Integrating CloudSOC with Information Centric Encryption (ICE) - Integrating CloudSOC with SIEM solutions. (7)
NETWORK LOGS, ENDPOINT LOGS, AD LOGS, WINDOWS EVENT LOGS, WEBLOGS: Endpoint logs: Understanding value - Methods of collection - Adding additional logging - Windows filtering and tuning - Analyze critical events based on attacker patterns - Host-based firewall logs - Credential theft and reuse - Monitor PowerShell. Event IDs, Logging and SIEMs: Windows Event Logs - Windows Event IDs - Windows Event Forwarding - Log Rotation & Log Clearing - PowerShell Logging – Sysmon – SIEM platforms - SIEM Architecture - SIEM Solution: ELK - Splunk –Security Onion. Network and Application Authentication Server Logs - Web Server Logs. (10)
LOG CORRELATION AND VISUALIZATION:Active Dashboards and Visualizations - Correlate network datasets - Build frequency analysis tables - Establish network baseline activity - Centralized log collection - Automate event log normalization and correlation - determining data for compliance and audits - Managing Endpoint Detection and Response (EDR) logs - Visualizing Log & Event Data - Exposing Significant Patterns - Pinpointing data and Global Visibility. (7)
ANOMALY DETECTION AND MACHINE LEARNING FOR THREAT HUNTING: How Machine Intelligence Applies to Threat Hunting - Building a Machine Intelligence Capability to Support Threat Hunting - Leveraging machine learning to orchestrate and automate SOC – Machine learning ranking model for validating the true and false positives in threat hunting. (5)
IOC (Indicators of Compromise): IOC Editor - OpenIOC - STIX (Structured Threat Information Expression) - CyBOX (Cyber Observable Expression) - TAXII (Trusted Automated Exchange of Indicator) - IOC-based Hunting - Introduction to Incident Response Playbooks: Incident Response – Reactive Incident Response – Proactive Incident Response - Incident Response and Hunting across Endpoints – Leveraging Incident response with Threat hunting IR Playbook. (6)
HUNTING USING MITRE ATTACK MATRIX: MITRE's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK(TM)) – ATT&CK Matrix – ATT&CK Based Analytics Development Method: Identify Behaviors - Acquire Data - Endpoint Sensing - Develop Analytics - Develop an Adversary Emulation Scenario - Emulate Threat - Investigate Attack - Evaluate Performance. (5)
Total L:45
TEXT BOOKS:
1. D. W. Murdoch, Don Murdoch, “Blue Team Handbook: Soc, Siem, and Threat Hunting Use Cases: A Condensed Field Guide for the Security Operations Team”, CreateSpace Independent Publishing Platform, 2018.
2. Jeff Bollinger, Brandon Enright, Matthew Valites, “Crafting the InfoSec Playbook: Security Monitoring and Incident Response Playbook”, O’Reilly, 2015.
REFERENCES:
1. Scott J Roberts, Rebekah Brown, “Intelligence-Driven Incident Response: Outwitting the Adversary”, O’Reilly, 2017.
2. Gerardus Blokdyk, “Cyber Threat Hunting A Complete Guide”, 5STARCooks, 2010.
20XC92 CRYPTOECONOMICS
3 0 0 3
Prerequisites:
INTRODUCTION: cryptographic hash functions – hash pointers and data structures digital signatures – public key as identity (4)
BLOCKCHAIN: centralization vs decentralization – distributed consensus – consensus without identity - task of mining blockchain - mining hardware –mining pools -. mining incentives and strategies (8)
SECURING BLOCK CHAINS :proof of work – proof of stake – proof of authority – forming consensus – transaction fees – incentives – attack vectors . (12)
BLOCKCHAIN IN ENTERPRISE:hyperledger framework tools and building blocks – hyperledger fabric component design – sample transaction – business networks powered by blockchain – business scenario and use cases (12)
CHAINCODE DEVELOPMENT: creating chaincode - access control- implementing functions – testing – design topics (4)
BUSINESS NETWORK: defining business network - introducing participant – introducing asset – introducing transaction – implementing business network (5)
Total L:45
TEXT BOOKS:
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder, "Bitcoin and Cryptocurrency Technologies", Princeton University Press, 2016.
2. Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun Wu , "Blockchain Development with Hyperledger", Packt Publishing, 2019.
3. KedarIyer, Chris Dannen, "Building Games with Ethereum Smart Contracts", Apress, 2018.
REFERENCES:
1. Melanie Swan, "Blockchain: Blueprint for a New Economy", Oreilly, 2015.
2. Aries Wanlin Wang, "Crypto Economy", Racehorse Publishing, 2018.
20XC93 CRYPTOECONOMICS
3 0 0 3
Prerequisites:
OVERVIEW OF COMPUTER FORENSICS TECHNOLOGY: Computer Forensics Fundamentals - Types of Computer Forensics Technology - Types of Computer Forensics Systems - Vendor and Computer Forensics Services. (6)
COMPUTER FORENSICS EVIDENCE AND CAPTURE: Data Recovery - Evidence Collection and Data Seizure-Duplication and Preservation of Digital Evidence - Forensic Identification and Analysis of Technical Surveillance Devices - Reconstructing Past Events. (5)
FILE SYSTEM FORENSIC ANALYSIS: Volume Analysis - Examining FAT File System - Deleted File Recovery in FAT - Examining NTFS File System - Deleted File Recovery in NTFS - File Carving - File Signature Searching Forensics - Keyword Forensics -Timeline Analysis - Data Hiding and Detection. Forensic Log Analysis. (7)(
WINDOWS REGISTRY FORENSICS: The Architecture of the Windows Registry - Registry Analysis, Processes and Tools, Analyzing the System Hives. (5)
INTERNET FORENSICS: Domain Name Ownership Investigation – Email Forensics – Messenger Forensics – Browser Forensics (6)
MOBILE DEVICE FORENSICS: Hand-held devices and Forensics – Reconstructing user’s activities and deleted data (4)
MEMORY FORENSICS AND MALWARE ANALYSIS: Memory data collection and Examination – Analyzing Windows and Linux systems for malware – Reverse Engineering tools and Techniques. (6)
CASE STUDIES: User Hives - Securing the Registry - Hacks, Tweaks, and Common Changes. (6)
Total L:45
TEXT BOOKS:
1. John R Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Charles River Media, Inc. Boston, Massachusetts, 2005.
2. Xiaodong Lin, “Introductory Computer Forensic- A Hands-on Practical Approach”, Springer, 2018.
3. Harlan Carvey, “Windows Registry Forensics- Advanced Digital Forensic Analysis of the Windows Registry”,Elsevier, 2016.
4. Mike Halsey, Andrew Bettany, “Windows Registry Troubleshooting”, Apress, 2015.
5. Cameron H. Malin, EoghanCasey ,James M. Aquilina,Curtis W. Rose, “Malware Forensics Field Guide for Windows Systems”, Elsevier, 2012.
REFERENCES:
1. Chuck Easttom, "System Forensics, Investigation, and Response", Jones & Bartlett Publishers, 2014.
2. Linda Volonino, Reynaldo Anzaldua, Jana Godwin, "Computer Forensics: Principles and Practices", Pearson/Prentice Hall, 2007
20XC96 THREAT HUNTING LAB
0 0 4 2
1. Identify living of the land techniques, including malicious use of PowerShell and WMI.
2. Use memory analysis, incident response, and threat hunting tools to detect hidden processes, malware, attacker command lines, rootkits, network connections, and more.
3. Manual hunting and log analysis
4. Automatic hunting using a hunting tool
5. Dig into log manipulation techniques challenging many SIEM solutions
6. Build out graphs and tables that can be used to detect adversary activities and abnormalities
7. Combine data into active dashboards
8. Utilize adversary techniques against them by using frequency analysis in large data sets
9. Develop baselines of network activity based on users and devices
10. Develop baselines of Windows systems with the ability to detect changes from the baseline
11. Apply multiple forms of analysis such as long tail analysis to find abnormalities
12. Correlate and combine multiple data sources to achieve more complete understanding
13. Provide context to standard alerts to help understand and prioritize them
14. Use log data to establish security control effectiveness
15. Implement log alerts that create virtual tripwires for early breach detection
Total P: 60
20XC97 COMPUTER FORENSICS LAB
0 0 4 2
1. Implementation of data analysis techniques.
2. Implementation of windows registry analysis.
3. Implementation of email forensics, Domain Name Server Forensics.
4. Implementation of hand-held device forensics activities.
5. Collecting evidence using memory forensics.
6. Analyzing Windows and Linux systems for malware
7. Network forensics for detecting SQL injection attacks.
8. Network forensics for Port Scanning attack.
9. Web application forensics.
Total P: 60
20XC98 SECURITY CAPSTONE LAB
0 0 4 2
Total P: 60
20XCP2 PROJECT WORK II – INDUSTRY / RESEARCH PROJECT
20XCE1 INFORMATION AND CODING THEORY
3 2 0 4
Prerequisites:
MEMORYLESS FINITE SCHEMES : Self information measure – Entropy function – Conditional entropies – Characteristics of entropy function – Derivation of the noise characteristics of a channel – Mutual information – Redundancy – Efficiency and channel capacity – Capacities of channels with symmetric noise structure. (10)
CONTINUOUS CHANNELS: Definitions of different entropies – Mutual information – Maximization of the entropy of a continuous random variable – Entropy maximization problems – channel capacity under the influence of additive white Gaussian noise – parallel Gaussian channel. (7)
ELEMENTS OF ENCODING : Source coding techniques – Necessary and sufficient conditions for noise less coding – Fundamental theorem of discrete noise-less coding – Fundamental theorem of discrete coding in presence of noise. (8)
ERROR CONTROL CODING : Need for error control coding – Linear block codes – Optimum soft decision decoding of linear block codes – Hard decision decoding – Polynomial representation of codes – Cyclic codes – Convolutional codes – viterbi decoding algorithm – Other decoding methods of convolutional codes – Galois fields – BCH Codes – Reed Solomon codes – Berlecamp Algorithm – Interleaving and concatenated codes – Turbo codes – Low density parity check codes(10)
ITERATIVE DECODING: Serial concatenation using inner block codes – serial concatenation using inner convolutional codes – product codes – generalized array codes – applications of multi stage coding – The BCJR algorithm – use of extrinsic information – recursive systematic convolutional codes – MAP decoding of RSC codes – Interleaving and Trellis termination – The soft output Viterbi algorithm – Galleger codes – Serial concatenation with iterative decoding – Performance and complexity issues – application to mobile communication. (10)
TUTORIAL PRACTICE:
1. Determination of entropy of a given source.
2. Determination of various entropies and mutual information of a given channel.
a) Noise free channel.
b) Error free channel
c) Binary symmetric channel
d) Noisy channel
Compare channel capacity of above channels.
3. Generation and evaluation of variable length source coding.
a) Shannon – Fanocoding and decoding
b) Huffman Coding and decoding
4. Coding & decoding of Linear block codes.
5. Coding & decoding of Cyclic codes.
6. Coding and decoding of convolutional codes.
7. Coding and decoding of BCH and RS codes.
8. Performance of a coded and uncoded communication system (Calculate the error probability).
9. Implementation of source coding and channel coding for transmitting a text file.
Total L:45+P:30=75
TEXT BOOKS:
1. Reza F M, “An Introduction to Information Theory”, McGraw Hill, 2012.
2. Joy A Thomas, Cover M, “Elements of Information Theory”, John Wiley, 2006.
3. J. C. Moreira, P. G. Farrell, “Essentials of Error Control Coding”, Wiley, 2006.
4. A. G. Burr, “Modulation and Coding for Wireless Communications”, Prentice-Hall, 2000.
REFERENCES:
1. Salvatore Gravano, “Introduction to Error Control codes”, Oxford University Press, 2001.
2. T. D. Moon, “Error Correction Coding: Mathematical Methods and Algorithms”, Wiley, 2005.
3. Peter Sweeney, “Error Control coding from theory to practice”, John Wiley, 2002.
4. S. Lin, D. J. Costello, “Error Control Coding”, Prentice-Hall, 2004.
20XCE2 QUANTUM COMPUTING
3 2 0 4
Prerequisites:
INTRODUCTION AND OVERVIEW: Introduction to quantum states and measurements with motivating examples. Comparison with discrete classical states- Qubits and pieces - Bloch sphere- quantum mechanical probabilities- quantum behaviours.- Matrix Algebra- basis vectors and orthogonality- inner product and Hilbert spaces- unitary operators and projectors- Dirac notation. (7)
QUANTUM MECHANICS: History of quanta - Postulates of quantum mechanics- Evolution and measurement - Entanglement -base states and superposition- structural randomness- measurement - Heisenberg's Uncertainty principle. (5)
FUNDAMENTALS OF QUANTUMNESS: The model of quantum computation - Quantum gates and circuits - No-cloning theorem - quantum entanglement - Bell states and Bell inequalities - Quantum Circuits - Pauli, Hadamard, phase, CNOT, Toffoli gates- quantum teleportation- universality of two-qubit gates. (11)
QUANTUM ALGORITHMS: Grover’s search algorithm: analysis and lower bounds - Deutsch-Josza algorithm- Simon’s problem - quantum Fourier transform - Shor’s period-finding algorithm - quantum key distribution (BB84, E91) (12)
QUANTUM COMPUTERS:Quantum information theory - Physical qubits - noise and decoherence - Applications of quantum information: Quantum Error Correction - fault-tolerant quantum computing - quantum complexity classes (10)
TUTORIAL PRACTICE:
1. Shor’s Factoring Algorithm Implementation
2. Simulation of Grover’s Search Algorithm
3. Matrix Product Verification using Quantum Fourier Transform(QFT)
4. Simple Quantum Random Walk Simulation
5. Implementation of Quantum Algorithms: Quantum Principal Component Analysis (PCA), Quantum Support Vector Machines (SVM)
6. Implementation of Quantum Error Correction Algorithms
Total L:45+P:30=75
TEXT BOOKS:
1. Michael A. Nielsen, Isaac L. Chuang, “Quantum Computation and Quantum Information”, Cambridge University Press, 2000.
2. Noson S. Yanofsky, Mirco A. Mannucci, Quantum Computing for Computer Scientists, Cambridge University Press.2008.
REFERENCES:
1. Phillip Kaye, Raymond Laflamme, Michele Mosca, “An Introduction to Quantum Computing”, Oxford University Press,2007.
2. Mermin N.D, “Quantum Computer Science: An Introduction”, Cambridge University Press, 2007.
3. Hirvensalo M, “Quantum Computing”, Springer, 2001.
20XCE3 POST QUANTUM CRYPTOGRAPHY
3 2 0 4
Prerequisites:
INTRODUCTION TO POST-QUANTUM CRYPTOGRAPHY : A taste of post-quantum cryptography, Challenges in post-quantum cryptography, Comparison to quantum cryptography. (3)
HASH-BASED DIGITAL SIGNATURE SCHEMES: Hash-based one-time Signature Schemes, Merkle’s tree authentication scheme, One-time key–pair generation using an PRNG, Authentication path computation, Tree chaining, Distributed signature generation, Security of Merkle signature scheme. (11)
CODE-BASED CRYPTOGRAPHY: Introduction- Cryptosystems- The security of computing syndromes as one-way functions, Codes and structures, Practical aspects. (11)
LATTICE-BASED CRYPTOGRAPHY:Introduction- Preliminaries – Finding short vectors in Random q-ary lattices, Public key encryption schemes, Digital signature schemes, Other cryptographic primitives. (11)
MULTIVARIATE PUBLIC KEY CRYPTOGRAPHY: Introduction – The Basics of Multivariate PKCs – Examples of Multivariate PKCs, Basic constructions and variations, Standard attacks. (9)
TUTORIAL PRACTICE:
Implementation of the following algorithms:
1. Lamport-Diffie one-time signature scheme.
2. Winternitz one-time signature scheme.
3. Merkle tree authentication scheme.
4. Authentication path computation.
5. Mc Eliece cryptosystem
6. NTRU cryptosystem
7. NTRU signature scheme
8. Rainbow signature scheme
Total L:45+P:30=75
TEXT BOOKS:
1. Bernstein, D. J, “Introduction to post-quantum cryptography”, Springer, Berlin, Heidelberg, 2009.
2. Kirill Morozov, Tsuyoshi Takagi, Mathematics of Post-quantum Cryptography (Mathematics for Industry), Springer Nature, 2020
REFERENCES:
1. Löndahl, C, “Some Notes on Code-Based Cryptography”, Department of Electrical and Information Technology, Lund University, 2015.
2. Peikert, C, “A decade of lattice cryptography, Foundations and Trends in Theoretical Computer Science”, 10(4), 283-424, 2016.
3. Ding, J, Gower, J. E, Schmidt, D. S, “Multivariate public key cryptosystems” (Vol. 25), Springer Science and Business Media, 2006.
20XCE4 ACTIVE DEFENSE USING DECEPTION
3 2 0 4
Prerequisites:
INTRODUCTION : Active Defense vs. Passive Defense, Passive Security Architecture - Current generation of Security tools and controls - Firewalls, IDS, SIEM, UEBA- Active Security Architecture - modern honeypots, honeydocs, breadcrumbs, baits (6)
HONEY POTS : Introduction - Interaction-level of deceptions - High Interaction, Medium Interaction, Low Interaction- SSH Honeypots, Elastichoney, HoneyNet Project, MHN Server- Client Honeypots - Capturing malware with honeypots - Detecting honeypots (8)
DECEPTION ARCHITECTURE AND STRATEGIES TO DEPLOY DECEPTION IN THE ENTERPRISE: Hidden Partitions, Port Obfuscation, Covert Network Tunnels, Steganography Processes, Obfuscating Code, Masking and Repackaging Ports- Delays- Delaying tactics-Delays in Web portal - Fakes - Fake software - Fake filesystem - Fighting spam and phishing with fakes (8)
LURING ADVERSARIES:Fake Services, Fake Traffic, Fake Content, Sinkholes, Labrea Tarpit, Tiny HP, SpiderTrap, Glastopf, Cowrie. (7)
PLANNING DECEPTION:Cost benefit anayis of Deception - Analysis of a single defensive deception -Analysis of two stage deception - Analysis of fake honeypot - Counterplanning against attacks with deception. (7)
CASE STUDIES:Honeyd - Correlating deceptive alerts with other alerts - Deception Systems for IOTs and ICS Systems - Deception in the Cloud- Combining Deception with machine learning, game theory (9)
TUTORIAL PRACTICE:
1. Honeytokens and honeypots for web ID and IH
2. Smart IDS - Hybrid LaBrea Tarpit
3. Using Deception Technologies to Defend Against Active Directory and Ransomware Attacks
4. Real-World Implementation of Deception Technologies
5. Deception for insider threat detection
6. Identifying lateral movement in healthcare environment
Total L:45+P:30=75
TEXT BOOKS:
1. Rowe, Neil C., Julian Rrushi, “Introduction to Cyber Deception”, Springer International Publishing, 2016.
2. Provos, Niels, Thorsten Holz, “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”, Pearson Education, 2007.
REFERENCES:
1. Jajodia, Sushil, V. Subrahmanian, Vipin Swarup, Cliff Wang, “Cyber deception”, Springer, 2016.
2. Al-Shaer, Ehab, “Autonomous Cyber Deception”, Springer International Publishing, 2019.
20XCE5 SECURITY MODELING AND ANALYSIS
3 2 0 4
Prerequisites:
INTRODUCTION : Computer security, Cryptographic protocols, Security analysis, Needham-Schroeder example, Model checker- Murphi. (5)
KEY EXCHANGE AND CONTRACT-SIGNING PROTOCOLS: Key management, Kerberos, Public-Key infrastructure, Security properties and attacks on them, Diffie-Hellman key exchange, IPSEC, IKE. Contract-Signing and Fair-Exchange, Trusted third party, Optimistic Contract-Signing, Asokan-Shoup-Waidner protocol, Desirable properties –fairness- timeliness- accountability, Abuse-Free Contract-Signing. (10)
MODELING SECURITY PROTOCOLS IN CSP: Data types for protocol models- Modeling intruder, Expressing protocol goals, Overview of FDR and Casper, Protocol specifications, Case study: Wide-Mouthed-Frog protocol. (10)
PROTOCOL COMPOSITION LOGIC: Proving protocols secure, Symbolic model, Challenge Response example, Informal ‘hand’ proof, Formalization: protocol specification language, syntax, semantics, proof system, Protocol composition, Complexity theoretic semantics. (10)
FORMAL PROOF OF COMPUTER SECURITY PROTOCOLS: Protocol Verification by BAN logic and Inductive Method: BAN logic- syntax and semantics, Inductive Method: Analysis by theorem proving, Inductive proofs, Protocol traces, Dolev-Yao attacker model. (10)
TUTORIAL PRACTICE:
1. Modeling Needham-Schroeder protocol
2. Analyzing Needham-Schroeder protocol in BAN logic
3. Modeling Asokan-Shoup-Waidner protocol
4. Modeling an intruder in CSP, FDR and Casper
5. Modeling Wide-Mouthed-Frog protocol
6. Analyzing Wide-Mouthed-Frog protocol in BAN logic
Total L:45+P:30=75
TEXT BOOKS:
1. Peter Ryan, Steve Schneider, “Modeling and Analyzing Security Protocols: The CSP approach”, Addison-Weasley, 2001.
2. Colin Boyd, Anish Mathuria, “Protocols for Authentication and Key Establishment”, Springer, 2010.
REFERENCES:
1. Tobias Nipkow, Lawrence C. Paulson, Markus Wenzel, “A Proof Assistant for Higher-Order Logic”, Springer, 2010.
2. C. A. R. Hoare, “Communicating Sequential Processes”, Prentice Hall, 2004.
3. Bella, Giampaolo, “Formal Correctness of Security Protocols”, Springer, 2007.
20XCE6 COMPUTER GRAPHICS AND VISUALIZATION
3 2 0 4
Prerequisites:
GRAPHICS INPUT - OUTPUT DEVICES: Raster scan Displays - Random scan displays - Direct view storage tubes - Flat panel displays - Mouse - Track Ball - Joy Stick - Digitizers - Touch panels - LCD. Graphical User Interface and Interactive Input Methods: The user dialog - Input of graphical data - Input function - Interactive picture construction techniques - Virtual reality (4)
OPENGL:Architecture, The OpenGL API, Primitives and Attributes, Color, Viewing, Control Functions, Programming Event-Driven Input, Transformations, OpenGL Extension. (4)
TWO DIMENSIONAL GRAPHICS: Basic transformations - Matrix representation and homogeneous coordinates - Composite transformations - Line drawing algorithms: DDA and Bresenham's algorithms - Circle generation algorithms: Midpoint circle algorithm - Point clipping - Line clipping: Cohen Sutherland algorithm - Polygon clipping: Sutherland Hodgeman algorithm - Line covering. (8)
RASTER GRAPHICS: Fundamentals: generating a raster image, representing a raster image, scan converting a line drawing, displaying characters, speed of scan conversion, natural images - Solid area scan conversion: Scan conversion of polygons,Y-X algorithm, properties of scan conversion algorithms - Interactive raster graphics: painting model, moving parts of an image, feedback images. (8)
CURVES AND SURFACES: Parametric representation of curves - Bezier curves – B-Spline curves - Parametric representation of surfaces - Bezier surfaces - Curved surfaces - Ruled surfaces - Quadric surfaces – Concatenation of two curve segments – Order of Continuity. (5)
IMAGE PROCESSING FUNDAMENTALS: Sampling and Quantization, Image Enhancement - Histogram Processing, Filtering, Edge Detection, Image Transforms. (8)
THREE DIMENSIONAL GRAPHICS: 3D transformations - Viewing 3D graphical data - Orthographic, oblique, perspective projections - Hidden lines and hidden surface removal. (4)
FRACTAL-GEOMETRY METHODS: Tiling the plane - Recursively defined curves - Koch curves - C curves - Dragons - Space filling curves - Fractals - Grammar based models - Graftals - Turtle graphics - Ray tracing. (4)
TUTORIAL PRACTICE:
1. Drawing a Line, Circle using algorithms
2. Implementation of 2D Transformations (translation, scaling, rotation)
3. Window – viewport simulation with various aspect ratios.
4. Line clipping and Polygon clipping using algorithms.
5. Polygon Filling Algorithm
6. Projections of 3D objects
7. Generation of Fractals
8. Manipulation of raster images.( Subtracting sub images)
9. Histogram Processing
10. Filtering
11. Noise Cleaning
12. Edge Detection
13. Image Transforms
14. Converting image from one color space to another color space
15. Drawing a 2D curve using Bezier and B-Spline generations.
16. 3d Projections – Orthographic and Perspective
17. Hidden Surface Removal algorithm
18. Mandelbrot and Julia Set Generation
19. Graftals Generation
20. Model a primitive (car / Aircraft) with OpenGL API.
Total L: 45+P:30=75
TEXT BOOKS:
1. Donald Hearn, Pauline Baker M, "Computer Graphics", Pearson Education, 2011.
2. William M. Newmann, Robert F Sproull, “Principles of Interactive Computer Graphics”, Tata McGraw Hill, 2014.
3. Angel, “Interactive Computer Graphics- A top down approach with OpenGL”, Pearson Education, 2014.
REFERENCES:
1. Foley James D, Vandam Andries, Hughes John F, "Computer Graphics: Principles and Practice", Addison-Wesley, 2006.
2. Rafael C Gonzalez., Richard Eugene Woods, “Digital Image Processing”, Pearson Education, 2013.
3. Solomon, C., Breckon, T, “Fundamentals of Digital Image Processing: A practical approach with examples in MATLAB”, John Wiley, 2011.
4. Donald Hearn and Pauline Baker M, “Computer graphics with OpenGL”, Pearson Education, 2011.
5. F S Hill, “Computer Graphics Using OpenGL”, Prentice Hall, 2007.
20XCE7 ARTIFICIAL INTELLIGENCE
3 2 0 4
Prerequisites:
INTRODUCTION: The foundations of AI - The History of AI - Intelligent agents - Agent based system. (2)
PROBLEM SOLVING: State Space models - Searching for solution - Uninformed/Blind search - Informed/ Heuristic search - A* search - Hill-climbing search - Meta Heuristic: Genetic Algorithm - Adversary based search : Minimax - Expectimax – Alpha Beta pruning – Constraint satisfaction problem - Backtracking search (10)
KNOWLEDGE REPRESENTATION AND REASONING: Knowledge representation - Logics - bivalent logic - inference - Fuzzy logic: membership - Fuzzy rules and reasoning - Fuzzy inference (11)
UNCERTAIN KNOWLEDGE AND PROBABILISTIC REASONING: Uncertainty - Probabilistic reasoning - Semantics of Bayesian network - Exact inference in Bayesian network- Approximate inference in Bayesian network - Probabilistic reasoning over time – Inference in temporal models - Hidden Markov Models – Dynamic Bayesian Networks (11)
DECISION-MAKING: Basics of utility theory, Utility functions - Sequential decision problems - Markov decision process - Value iteration - Policy iteration - Decisions in Multi agent system: Multi agent decision theory - Group decision making (11)
TUTORIAL PRACTICE:
1. Search Techniques: A* algorithm for 8 – puzzle and Missionaries and Cannibals problem, Hill climbing, genetic algorithm and Constraint satisfaction techniques
2. Simple games – minimax and expectimax
3. Logic based exercises, Fuzzy Inference System.
4. Decision making: Implementing HMM models, sequential and multi agent decision making
Total L:45+T:30=75
TEXT BOOKS:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, 4th edition Pearson Education, 2020.
2. David Pool and Alan Mackworth, “Artificial Intelligence: Foundations of Computational agents”, Cambridge University Press, 2017.
3. Timothy Ross, “ Fuzzy Logic with Engineering Applications”, 4thedition, John Wiley and sons, 2016.
REFERENCES:
1. Christopher M.Bishop, “Pattern Recognition and Machine Learning”, Springer, 2013.
2. Nils J. Nilsson, “The Quest for Artificial Intelligence: A History of Ideas and achievements”, Cambridge University Press, 2010.
3. Daphne Koller and N Friedman, “Probabilistic Graphical Models - Principles and Techniques”, MIT press, 2009.
20XCE8 SOCIAL NETWORK ANALYSIS
3 2 0 4
Prerequisites:
INTRODUCTION: Motivation - different sources of network data - types of networks - tools for visualizing network data - review of graph theory basics (9)
GRAPH THEORETIC PROPERTIES OF SOCIAL NETWORKS: Notions of centrality - Strong and weak ties – Homophily - Structural Balance. (5)
DYNAMIC PROPERTIES OF NETWORKS: Information diffusion - networks effects on information diffusion - maximizing influence spread - power law and heavy tail - preferential attachment models - small world phenomenon - cascading behavior on networks - Epidemics. (11)
BEHAVIORAL PROPERTIES ON NETWORKS: Network economics - Bargaining and power in networks - Sponsored search markets. (10)
MINING GRAPHS: Community and cluster detection: random walks - spectral methods - link analysis for web mining. (10)
TUTORIAL PRACTICE:
1. Getting acquainted with UCINET and Netdraw.
2. Implementing graph-theoretic/social network metrics using UCINET.
3. Working with Visualization, Ego networks, Centrality, Community Detection etc.
4. Social Media Threats- Facebook Malware, Twitter Phishing
Total L:45+T:30=75
TEXT BOOKS:
1. David Easley, Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly Connected World”, Cambridge University Press, 2010.
2. Michael Cross, “Social Media Security: Leveraging Social Networking While Mitigating Risk”, Elsevier,2014.
REFERENCES:
1. Peter R. Monge and Noshir S. Contractor, “Theories of Communication Networks”, Oxford University Press, 2003.
2. Duncan J Watts. “Six degrees: The Science of a Connected Age”, Norton, 2004.
3. Narahari Y, Garg D, Ramasuri N, and Prakash H, “Game Theoretic Problems in Network Economics and Mechanism Design Solutions”, Springer Verlag, 2008.
4. Charu C. Aggarwal,, ”Social Network Data Analytics”, Springer, 2015.
20XCE9 APPLIED GRAPH THEORY
3 2 0 4
Prerequisites:
BASIC CONCEPTS: Graphs - directed and undirected, subgraphs, graph models, degree of a vertex, degree sequence, Havel-Hakimi theorem, Hand-shaking lemma. Connectivity, walk, path, distance, diameter. Isomorphic graphs. Common classes of graphs – regular, complete, petersen, cycle, path, tree, k-partite, hypercube, Spanning trees – Matrix tree theorem, graph decomposition. (6)
CONNECTIVITY:Vertex and edge connectivity, Vertex and edge cuts, relationship between vertex and edge connectivity, bounds for connectivity. Harary’s construction of k-connected graphs- Attack trees. (8)
EULERIAN AND HAMILTONIAN GRAPHS: Eulerian graphs, Route inspection problem, Hamiltonian graphs, Gray codes and Hypercubes, Travelling sales person problem , Telephone call graph.(8)
MATCHING, VERTEX-COLORING AND DOMINATION: Matching (unweighted), Perfect matching, Hall’s theorem, assignment problem, augmenting path algorithm. Vertex-coloring – bounds, assignment of frequencies, fast register allocation, scheduling problem. Dominating set, domination number, bounds, connected dominating set in Ad Hoc Networks- Cellular mobile tower placement problem. (11)
PLANAR GRAPHS: Properties, Kuratowski’s theorem, Hopcroft Tarjan Planarity testing algorithm. (5)
RANDOM GRAPHS: Random graph – Definitions of G(n, p) and G(n, M) models, power law degree distribution, Web graph models, applications to social networks. (7)
TUTORIAL PRACTICE:
Case Studies
Total L:45+T:30=75
TEXT BOOKS:
1. Anthony Bonato, “A Course on Web Graphs”, American Mathematical Society, 2008.
2. Haynes T W, Hedetniemi, Slater P J, “Fundamentals of Domination in Graphs”, CRC Press, 2015.
3. Jonathan Gross, Jay Yellen, “Graph Theory and its Applications”, CRC Press, 2005.
REFERENCES:
1. Douglas B West, “Graph Theory”, Prentice Hall, 2009.
2. Bondy J A, Murty U S R, “Graph Theory”, Springer, 2013.
20XCEA MULTIMEDIA SECURITY
3 2 0 4
Prerequisites:
Introduction to Multimedia: Image, Video and Audio Formats and Standards, and Digital Rights Management - Mathematical Preliminaries –Transforms-,Random Sequence Generation-Chaotic Maps - Error Correction Codes. (4)
Multimedia fingerprinting: Fingerprinting basics, Collusion attack- Frame proof and anti-collusion codes; Combining fingerprint modulation with coding: Introduction to coded fingerprint modulation, Semi-fragile fingerprinting; Multicastfingerprinting problem- Efficient security architectures: WHIM, Watercasting, Chameleon cipher; Joint fingerprinting and decryption (JFD)framework; Fingercasting. (5)
Multimedia Encryption : Requirements – Multimedia compression technologies and standards; Principles for selective encryption – Format Compliant Encryption,-Thumbnail preserving encryption- Scalable Encryption and Multi-Access Encryption.- Video encryption schemes: Chaotic maps, Transform domain encryption -Huffman tree mutation; Streaming media encryption: Scalable video protection (8)
Security Attacks : Traditional Attacks, Statistical Attack, -Filtering - Remodulation, -JPEG Coding Distortion and JPEG 2000 Compression, Geometric Transformation -Image Scaling, Rotation, Image Clipping, Linear Transformation, Bending, Warping and Perspective Projection, Cryptographic attacks and Protocol attacks,- Error concealment attack. (6)
Digital Water marking : Spatial-Domain Watermarking - Frequency-Domain Watermarking -, Watermarking Based on Vector Quantization, Fragile Watermarking - Media-Specific Digital Watermarking(Video- Audio- Binary image) - Spread Spectrum Watermarking - Robustness to Temporal and Geometric Distortions - Affine-Resistant Watermarking- Protocols for Secure Computation - Watermarking Tools. (7)
Steganography: Requirements and Applications, Types– Text, Audio, Video, Linguistic and Network steganography Algorithms – LSB Method, GIFshuffle, EzStego,Jsteg, Steganographic Tools Steganalysis - Statistical Properties of Images, The Visual Steganalytic System, IQM-Based Steganalytic System, Frequency-Domain Steganalytic System. (8)
Content Authentication: ultimedia authentication: Perceptual hashes;Parameterization; Watermarking based authentication: Notion of semi- fragility -,Construction and design of semi-fragile watermarks; Example: Principles of video authentication: Scalability issues, packet loss, post-processing Multimedia Forensics (7)
TUTORIAL PRACTICE:
1. Multimedia encryption
2. Authentication of multimedia contents
3. Key management of multimedia access and distribution
4. Data embedding for various media types/applications
5. Multimedia fingerprinting
6. Detection image tampering
7. Detection of Hidden information
8. Watermarking of raw digital images:embedding and detection
9. Perform targeted attacks on watermarking schemes
10. Detection of watermarking in the DWT-Domain
11. Staganalysis
Total L:45+P:30=75
TEXT BOOKS:
1. Frank Y. Shih, “Multimedia Security”, CRC Press, 2017.
2. Amit Pande, Joseph Zambreno, “Embedded Multimedia, Security Systems, Algorithms and Architectures”, Springer verlag, 2013.
3. Shiguo Lian, “Multimedia Content Encryption: Techniques and Applications”, Auerbach Publications, Taylor & Francis Group, 2009.
4. Cox, Miller, Bloom, Fridrich, Kalker, “Digital Watermarking and Steganography” Morgan Kaufmann, 2008.
REFERENCES:
1. K. Karthik, D. Hatzinakos, “Multimedia Encoding for Access Control with Traitor Tracing: Balancing Secrecy, Privacy and Traceability”, VDM Verlag, 2008.
2. Wenjun Zeng, Heather Yu, Ching-Yung Lin, “Multimedia Security Technologies for Digital Rights Management”, Elsevier, 2006.
3. Borko Furht, Darko Kirovski, “Multimedia Security Handbook”, CRC Press, 2005.
20XCEB IDENTITY AND ACCESS MANAGEMENT
3 2 0 4
Prerequisites:
INTRODUCTION: The Five A’s of Enterprise IAM : Authentication, Authorization, Administration, Audit, and Analytics, Components of an Identity Service, Identity and Access Governance, Identity Standards - Understanding Enterprise Identity: Types of Accounts, Entitlements, and Roles. (5)
LDAP: Basics, LDAP Configuration, Operational Considerations, LDAP Proxy - SAML: Assertions, Bindings, Protocols, and Profiles, Open Source SAML Software. (8)
OAuth: OAuth Roles, Tokens, Grants, OAuth Client. OpenID Connect - Strong Authentication: OTP, HOPT and TOTP, Mutual SSL/TLS, Fast Identity Online, W3C Web Authentication and CTAP (12)
User-Managed Access: UMA Grant - UMA Federated Authorization - Managing Scopes - Managing Authorization Policies. (4)
IDENTITY MANAGEMENT: MidPoint, Apache Syncope, Wren:IDM - Multiparty Federation: Federation Privacy consideration, Federation Policy, Data Protection code of conduct, Network use agreement, Actors, Trust models, SAML federations via Metadata Aggregate , OTTO Federation. (12)
Single Sign-On (SSO) : - federated SSO - Cross-Domain Single Sign On. Preventing Password fatigue and cloud sprawl (4)
TUTORIAL PRACTICE:
1. Using OpenID connect for authentication.
2. Controlling access to web content via the web proxy - Apache httpd, mod_auth_openidc, Nginx, Kong, and Istio
3. Implementing strong authentication – OTP
4. Implementation of Fast Identity Online (FIDO)
5. Strengthening Authentication with the Gluu Server
6. Implementing SSO
Total L:45+T:30=75
TEXT BOOKS:
1. Schwartz, M, Machulak, M, “Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software”, Apress, 2018.
2. Orondo, P. O, “Identity and Access Management: A Systems Engineering Approach” , IAM imprints, 2014.
REFERENCES:
1. Nickel J, “Mastering Identity and Access Management with Microsoft Azure”, Packt Publishing Ltd, 2016.
2. Kenning W, “Open Source Identity Management Patterns and Practices Using OpenAM 10. X”, Packt Publishing Ltd, 2013.
3. Spasovski M, “OAuth 2.0 Identity and Access Management Patterns”, Packt Publishing Ltd, 2013.
20XCEC ESSENTIALS OF CYBER PHYSICAL SYSTEM SECURITY
3 2 0 4
Prerequisites:
INTRODUCTION: Cyber-Physical System concepts - Design Challenges-Mobile Cyber-physical systems-Design Principles-Physical system controls-Intelligence application of HDP-HMM in recognition of dynamic hand gestures. (10)
MODELING IN CYBER-PHYSICAL SYSTEMS: Introduction to models of computation-Languages and tools for system design-Physical System Modeling on cognitive Unmanned Aerial Vehicle-Concurrent models of computation-Continuous time model - Acausal model - Mixed Model-Hybrid systems, (9)
SENSOR BASED CYBER-PHYSICAL SYSTEMS: Wireless Sensor and Actuator Networks for Cyber-Physical Systems-Applications-Community Sensing-Wireless Embedded/Implanted Micro Systems-Architecture and Security-The Application of Machine Learning in monitoring -Robotics –Transportation. (8)
CIVILIAN CYBER-PHYSICAL SYSTEM APPLICATIONS: Energy efficient building Cyber-Physical System for Smart Grid Applications – Cyber-Physical System for transportation applications-Video communications -Digital Manufacturing/Industry 4.0 -IEEE 802.1 AS standards (10)
SECURITY IN CYBER PHYSICAL SYSTEMS: Overview of security and privacy in Cyber-Physical System – Network Security and Privacy for Cyber-Physical Systems – Data Security and Privacy in Cyber-Physical Systems for Healthcare – Detecting Data Integrity Attacks in Smart Grid – Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities. (8)
TUTORIAL PRACTICE:
1. Working with smart networked systems with embedded sensors, processors and actuators.
2. A study on taxonomy of Cyber Attacks on SCADA systems.
3. Hands on working with Robot Operating System and explore its vulnerabilities.
4. Working with CPS simulators for designing a CPS environment.
5. Understanding the concepts of deception in CPS and analyse stealthy deception attacks for cyber-physical systems.
6. Analysing security issues in Medical CPS.
7. Exploring the vulnerabilities of surgical robots.
8. Cyber physical security for smart devices.
9. Designing Cryptographic solutions for CPS Security.
10. Privacy Preservation for IoT-based Cyber-Physical Systems
Total L:45+P:30=75
TEXT BOOKS:
1. Fei Hu, “Cyber-Physical Systems: Integrated Computing and Engineering Design”, CRC Press, 2013.
2. E. A. Lee, S. A. Seshia, “Introduction to Embedded Systems, A Cyber-Physical Systems Approach”, MIT Press, 2015.
REFERENCES:
1. Rajeev Alur, “Principles of Cyber Physical Systems”, MIT Press, 2015.
2. Siddesh, Deka, Srinivasa, Patnaik, “Cyber-Physical Systems – A Computational Perspective”, CRC Press, 2016.
3. Houbing Song, Glenn A Fink, Sabina Jeschke, “Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and Applications”, Wiley, 2018.
4. Rolf Drechsler, Ulrich Kuhne, “Formal Modeling and Verification of Cyber-Physical Systems”, Springer, 2015.
5. Stefan Posald, “Ubiquitous Computing: Smart Devices, Environments and Interactions”, John Wiley Sons Ltd, 2009
20XCED DATA COMPRESSION
3 2 0 4
Prerequisites:
DATA COMPRESSION LEXICON: Introduction to Data Compression - Dawn Age - Coding - Lossy Compression. (4)
MINIMUM REDUNDANCY CODING (THE DAWN AGE): The Shannon - Fano Algorithm, The Huffman Algorithm - Into the Huffman Code : Counting the Symbols, Building the tree . (5)
ADAPTIVE HUFFMAN CODING: Adaptive Coding - Updating the Huffman Tree - Escape code. (5)
ARITHMETIC HUFFMAN CODING: Arithmetic Coding with floating point data type – Arithmetic coding with integral data type. (6)
STATISTICAL MODELING: Higher-order Modeling - Finite Context Modeling – Order one modeling – Order two Modeling. (5)
SPEECH COMPRESSION: Digital Audio Concepts - Lossless Compression of Sound. (5)
VIDEO COMPRESSION: JPEG Compression - Implementing DCT - Complete Code Listing. (5)
DICTIONARY-BASED COMPRESSION: LZ77 Compression and Decompression - LZSS Compression and Decompression - LZ78 Compression and Decompression - LZW Compression and Decompression – LZMW Compression and Decompression - LZAP Compression and Decompression – LZY Compression and Decompression. (10)
TUTORIAL PRACTICE:
1. Implement Shannon Fano algorithm and Huffman algorithm.
2. Design compression and decompression program using adaptive Huffman coding.
3. Implement arithmetic coding algorithm.
4. Design compression program using statistical modeling upto 3 order.
5. Design compression and decompression program using LZ77 algorithm.
Total L:45+T:30=75
TEXT BOOKS:
1. Khalid Sayood, “Introduction to Data Compression”, Morgan Kaufmann, 2013.
2. David Salomon, “Data Compression: The Complete Reference”, Springer, 2014
REFERENCES:
1. Charles K. Chui, Qingtang Jiang, "Applied Mathematics: Data Compression, Spectral Methods, Fourier Analysis, Wavelets and Applications", Atlantic Press, 2013
20XCEE BIG DATA AND MODERN DATABASES
3 2 0 4
Prerequisites:
OBJECT AND SPATIAL DATABASES:Query Optimization in Relational Databases - Object Oriented Databases – Object relational Databases - Complex data types - Structured types and Inheritance - Query Processing in Object databases - Geometric Information System - Spatial Databases : Spatial Data Types – Spatial Queries - Spatial indexing techniques (5)
PARALLEL AND DISTRIBUTED DATABASES: Architecture of parallel databases – Parallel query evaluation, Parallel query optimization – Distributed DBMS Architecture, Distributed Database Design, Distributed Query Processing (6)
DATA MODELING FOR BIG DATA: Big Data and Challenges, Big Data models, NoSQL data models, Basic principles of NoSQL models, SQL databases Vs NoSQL databases - MAP-REDUCE : Apache Hadoop and HDFS, Big data Applications (8)
NOSQL DATABASES: Key - Value Stores: Oracle Coherence – Amazon DynamoDB, Key -Value Stores (in-memory) : Redis , Berkeley DB (8)
COLUMN & DOCUMENT ORIENTED STORE: Google BigTable , Apache Cassandra - Hbase - MongoDB - Apache CouchDB (8)
GRAPH DATABASES: Neo4J - OrientDB (5)
DATABASE INTEGRATION: Data warehousing, Schema directed data integration - Schema mapping and information preservation - Information Preserving XML Schema Embedding. (5)
TUTORIAL PRACTICE:
1. ORDB, Spatial databases.
2. Distribution using Map-Reduce on Big Data (Hadoop).
3. Data Integration from heterogeneous Databases.
4. Creating and querying of object databases and object relational databases
5. Implementing of spatial databases and spatial queries
6. Implementation of No-SQL databases :DynamoDB, MongoDB, HBASE, Neo4J
Total L:45+T:30=75
TEXT BOOKS:
1. Pramod J. Sadalage, Martin Fowler, “NoSQL Distilled - Brief Guide to the Emerging World of Polyglot Persistence”, Pearson Education, 2013.
2. Guy Harrison, “Next generation Databases: NoSQL and BigData”, Apress, 2015.
3. Kristina Chodorow, Shannon Bradshaw, Eoin Brazil, “MongoDB: The Definitive Guide”, O’Reilly Media, 2019
4. Holden Karau, Andy Konwinski, Patrick Wendell, Matei Zaharia, “Learning Spark: Lightning-Fast Big Data Analysis”, O'Reilly Media, 2015
REFERENCES:
1. Elmasri R, Navathe SB, “Fundamentals of Database Systems”, Pearson Education, 2016.
2. M.Tamer Ozsu, Patrick Valduriez, “Principles of Distributed Database Systems”, Springer, 2020.
3. Anhai Doan, Alon Halevy, Zachary Ives, “Principles of data integration”, Morgan Kaufmann, 2012.
20XCEF NETWORK FORENSICS
3 2 0 4
Prerequisites:
Introduction: Footprints - Concepts in Digital Evidence - Network Forensics Investigative Methodology (OSCAR) - Sources of Network-Based Evidence - Evidence Acquisition (6)
Traffic Analysis : Protocol Analysis - Packet Analysis - Flow Analysis – Higher Layer Traffic Analysis (8)
Statistical Flow Analysis : Process Overview – Sensors - Flow Record Export protocols - Collection and Aggregation - Analysis (7)
Network Intrusion Detection and Analysis : why Investigate NIDS/NIPS? -Typical NIDS/NIPS Functionality - Modes of Detection - Types of NIDS/NIPSs - NIDS/NIPS Evidence Acquisition - Comprehensive Packet Logging - Snort (9)
Event Log Aggregation, Correlation, and Analysis Sources of Logs - Network Log Architecture - Collecting and Analyzing Evidence – Switch Evidence – Router Evidence – Firewall Evidence (6)
Web Proxies Why Investigate Web Proxies? - Web Proxy Functionality - Evidence - Squid - Web Proxy Analysis - Encrypted Web Traffic (9)
TUTORIAL PRACTICE:
1. Analysis of the packets and flow analysis using Wireshark and tshark.
2. Analysis of higher-level protocols like DHCP, DNS, SMTP
3. Familiarize with various tools like netflow, silk for flow analysis
4. Familiarize with Network Intrusion detection tools like Snort
5. Log analysis and event correlation
6. Web proxy analysis.
Total L:45+T:30=75
TEXT BOOKS:
1. Davidoff, Sherri, Jonathan Ham, “Network forensics: Tracking Hackers Through Cyberspace”, Prentice hall, 2012.
REFERENCES:
1. EC-Council, “Computer Forensics: Investigating Network Intrusions and Cyber Crime”. Nelson Education, 2009..
2. Jessy Bullock, Jeff Parker, “Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework”, Wiley, 2017.
3. Bejtlich, Richard, “The Practice of Network Security Monitoring: Understanding Incident Detection and Response”, No Starch Press, 2013.
20XCEG BIOMETRIC SECURITY
3 2 0 4
Prerequisites:
Introduction: History and Evolution of biometrics, biometrics applications, access control. (5)
Biometric System Architecture: Introduction of Biometric traits and its aim, image processing basics, basic image operations, filtering, enhancement, sharpening, edge detection, smoothening, enhancement, thresholding, localization, feature extraction, classification, matching, searching and verification. (10)
Biometric system modalities: Face recognition, Voice Recognition, Fingerprint Recognition, Iris Recognition, Retina, hand geometry, DNA recognition system, Behavioural biometrics- signature, gait, keystroke. (15)
Biometric system design and performance evaluation: Quantitative analysis on the biometrics, Performance evaluation in Biometrics –false acceptance rate; false rejection rate. (5)
Multimodal Biometric systems: Biometric system integration, multimodal biometric systems- theory and applications, performance evaluation of multimodal biometric systems. (5)
Biometric System Security: Biometric attacks/tampering, solutions, biometric encryption. (5)
TUTORIAL PRACTICE:
1. Implementing physiological biometric modalities
2. Implementing behavioural biometric modalities
3. Identification of Biometric attacks
4. Biometric encryption.
Total L:45+T:30=75
TEXT BOOKS:
1. Benjamin Muller, “Security, Risk and the Biometric State: Governing Borders and Bodies”, Routledge, 2010.
2. Anil K Jain, Patrick Flynn, Arun A. (Eds.), “Handbook of Biometrics”, Springer, 2008.
REFERENCES:
1. Julian D. M. Ashbourn, Biometrics: Advanced Identify Verification: The Complete Guide, Springer-verlag,2000.
2. DavideMaltoni, Handbook of Fingerprint Recognition, Springer-verlag,2009.
3. Handbook of Iris Recognition, Editors: Kevin W. Bowyer, Mark J. Burge, Springer-verlag,2016.
4. Biometric Systems: Technology, Design and Performance Evaluation, Editors: J. Wayman, A. Jain, D. Maltoni and D. Maio, Springer, 2005
5. Digital Image Processing using MATLAB, By: Rafael C. Gonzalez, Richard EugeneWoods, Steven L. Eddins,Tata McGraw-Hill Education 2010
20XCEH GAME THEORY
3 2 0 4
Prerequisites:
INTRODUCTION: Game theory the theory of rational choice – Interacting decision makers. (2)
NASH EQUILIBRIUM: Strategic games – Best response – Dominance – Examples from economics, business, environment, military - Symmetric games and symmetric equilibria. Illustrations: Cournot’s model of oligopoly, Electoral competition. (7)
MIXED STRATEGIES: Dominance – Equilibrium – Illustrations: Expert diagnosis, Reporting a crime – Formation of players’ beliefs. (5)
EXTENSIVE GAMES WITH PERFECT INFORMATION: Strategies and outcomes – Nash equilibrium – Subgame perfect equilibrium - Stackelberg’s model of duopoly, Buying votes – Illustrations: Entry into a monopolized industry, Electoral competition with strategic voters, Committee decision making. (7)
GAMES WITH IMPERFECT INFORMATION: Bayesian games – Examples – Strategic information – Transmission – Agenda Control with imperfect Information – Signaling games - Education as a signal of ability. (8)
REPEATED GAMESDThe prisoner’s dilemma – Finitely repeated and infinitely repeated – Strategies – Nash equilibrium – Subgame – Perfect equilibria and the one – deviation – Property – General results – Finitely replaced games – Variation on a theme: Imperfect observability. (8)
INTRODUCTION TO ALGORITHMIC GAME THEORY: Auction and mechanism design basics - the Vickrey auction - Sponsored Search Auction - Social choice theory - VCG mechanism. Algorithmic Aspects of Equilibria: Existence and computational complexity equilibria - Market Equilibrium - Correlated Equilibrium. (8)
TUTORIAL PRACTICE:
1. Identifying dominant and dominated strategies; Finding dominant strategy equilibrium and iterated elimination of dominated strategies equilibrium; Finding Nash equilibrium.
2. Finding best response functions for players; Finding Nash equilibria using best response functions; Finding Nash equilibria in mixed strategies.
3. Finding subgame perfect equilibria (SPE) for extensive games with perfect information by backward induction; Finding all Nash equilibria by converting to normal form game and eliminate the Nash equilibria which are not subgame perfect equilibria.
4. Finding mixed strategies and behavioral strategies in extensive form games. Finding whether a mixed strategy is equivalent to a behavioral strategy and vice-versa. Finding equibria in Bayesian games.
5. Finding conditions under which grim-trigger strategy, limited-punishment strategy, and tit-for-tat strategies are Nash equilibria in repeated games.
Total L:45+P:30=75
TEXT BOOKS:
1. Martin J Osborne, “An Introduction to Game Theory”, Oxford University Press, 2009.
2. Vijay Krishna, “Auction Theory”, Academic Press, 2009.
REFERENCES:
1. Joel Watson, “Strategy: An Introduction to Game Theory”, W. W. Norton & Company, 2013.
2. Steven Tadelis, “Game Theory: An Introduction”, Princeton University Press, 2013.
3. David Easley, Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly Connected World”, Cambridge University Press, 2010.
4. Matthew O. Jackson, “Social and Economic Networks”, Princeton University Press, 2008.
5. N. Nisan, T. Roughgarden, E. Tardos, V. Vazirani, “Algorithmic Game Theory”, Cambridge University Press, 2007
20XCEI ETHICS AND CYBER LAW
3 2 0 4
INTRODUCTION: private sector data laws – anti hacking laws – public private sector efforts – government surveillance laws – cybersecurity requirements for government contractors – privacy law (4)
DATA PRIVACY LAW: FTC data security – state data breach notification laws – state data security laws – state data disposal laws (8)
CYBER SECURITY LITIGATION: common causes of actions arising from data breaches – class action certification in data breach litigation – insurance coverage for cybersecurity incidents – protecting cybersecurity work product and communication from discovery (12)
ANTI HACKING LAWS: computer fraud and abuse act – state computer hacking laws – copy right act (6)
FEDARAL GOVERNMENT CONTRACTORS: federal information security management act – NIST information security controls – classified information security – covered defence information and controlled unclassified information (4)
PRIVACY LAWS: FTC act and privacy – health insurance portability and accountability act – video privacy protection act - children online protection act – online privacy laws – biometric information privacy act – privacy and social media (6)
CYBER SECURITY AND INTERNATIONAL LAW: international agreements – cyber threat and war – cyber war issues – cyber defence under international law (5)
TUTORIAL PRACTICE:
1. Implementation of phishing detection techniques.
2. Implementation of cyber stalking detection techniques.
3. Implementation of cyber bullying detection techniques.
4. Implementation of impersonation detection techniques.
5. Implementation of obscenity detection techniques.
6. Implementation of cyber terrorism detection techniques.
7. Implementation of salami attacks detection techniques.
Total L:45+P:30=75
TEXT BOOKS:
1. Jeff Kosseff, "Cybersecurity Law", Wiley, 2017.
2. Jay Kesan, "Cybersecurity and Privacy Law in a Nutshell", West Academic Publishing, 2019.
3. Uchenna Jerome Orji, "Cybersecurity: Law and Regulation", Wolf Legal Publishers, 2019
REFERENCES:
1. Shimon Brathwaite, "Cybersecurity Law: Protect Yourself and Your Customers”, Business Expert Press, 2019.
20XCEJ DIGITAL IMAGE PROCESSING
3 2 0 4
Prerequisites:
DIGITAL IMAGE FUNDAMENTALS :Image Sampling and Quantization, Digital Image Representation, Image Types, Pixel Neighborhood. (3)
IMAGE ENHANCEMENT Noise models, Point Operations, Histogram Processing, Spatial Operations, Multispectral Image Enhancement, Color Image Enhancement. Image Transforms - Fourier Transform, Discrete Cosine Transform, Wavelets. (6)
EDGE-DETECTION The Purpose of Edge Detection, Traditional Approaches and Theory, Edge Models, Comparison of Two Optimal Edge Detectors, Color edges. (5)
DIGITAL MORPHOLOGY Connectedness, Binary Operations, Dilation and Erosion, Opening and Closing, Grey-Level Morphology, Color Morphology.Image Restoration – Image Degradations, The Frequency Domain, The Inverse Filter, The Wiener Filter, The Homomorphic Filter, Least Square Filters, Generalized Inverse & Iterative Methods. (6)
GREY-LEVEL SEGMENTATION Basics of Grey-Level Segmentation, The Use of Regional Thresholds, Moving Averages, Cluster-Based Thresholds, Multiple Thresholds, Region-based segmentation, Watershed Transform. (9)
IMAGE ANALYSIS Feature Extraction - color, texture and shape features, Dimensionality Reduction, Clustering and Classification. (9)
IMAGE-BASED SECURITY Visual Cryptography – Extended Visual Cryptography, Dynamic Visual Cryptography, Dimension, Computation Based – Computationless approaches, Digital Image Watermarking – Classification, Attacks, Measures of Evaluation, Types – Fragile, Robust, Dual – Steganography – Properties, Performance Measures, Steganalysis, Multimodal Biometrics. (7)
TUTORIAL PRACTICE:
1. Implementation of Viewing digital images, bits and bytes, sampling and quantization.
2. Apply scaling, translation and rotation, sums and differences with the grayscale and color images.
3. Implementation of Histograms and stretches, convolutional filters.
4. Implement Fourier transforms and the frequency domain, non-linear filters.
5. Construct edge detection algorithms using Operators.
6. Implement the morphological operations.
7. Apply various image encoding methods with grayscale images.
8. Implement various image segmentation methods.
9. Extract various image features and implement clustering and classification methods.
10. Implement various image-based security algorithms.
Total L:45+P:30=75
TEXT BOOKS:
1. Rafael C Gonzalez, Richard E Woods, “Digital Image Processing”, Prentice Hall, 2011.
2. Anil K Jain, “Fundamentals of Digital Image Processing”, Prentice Hall, 2001.
REFERENCES:
1. J.R. Parker, “Algorithms for Image Processing and Computer Vision”, John Wiley & Sons, 2010.
2. M. L., Gavrilova, M. Monwar, “Multimodal Biometrics and Intelligent Image Processing for Security Systems”, Information Science Reference, 2013.
20XCEK NATURAL LANGUAGE PROCESSING
3 2 0 4
Prerequisites:
INTRODUCTION: Natural language processing techniques - analysis in NLP: morphological – syntactic, semantic - pragmatic - Applications (2)
WORDS : Regular expressions – Automata – Morphology – Finite state Transducers – Finite state morphological parsing – Combining FST lexicon and rules – Porter Stemmer Algorithm – Probabilstic models for Spelling – Bayes method, Minimum edit distance - N-Grams – Counting words in Corpora – Simple n-grams – Smoothing – Evaluating language models : Entropy, Perplexity- Part of Speech Tagging (POS) – Rule based tagging – Stochastic based tagging – Transformation based tagging - Context Free Grammars - Top down parser – Earley Algorithm – Bottom-up parsing – CYK parser – Probabilistic parsing. (12)
SEMANTICS & PRAGMATICS: First order predicate calculus – Syntax driven sematic analysis – Attachments for a fragment of English – Word Sense Disambiguation – Machine learning approaches – Dictionary based approaches – Pragmatics : Discourse – Text coherence. (10)
DEEP LEARNING in NLP : Text representation – Word2Vec models – Recurrent neural network (RNN) – Long short term memory(LSTM ) (6)
NATURAL LANGUAGE GENERATION : Architecture of NLG Systems- Generation Tasks and Representations- Application of NLG. Machine Translation: Language similarities and differences – The transfer metaphor – Direct translation – Statistical translation - Translation involving Indian Languages. (11)
CASE STUDIES : Mail spam, web spam detection, Fake news detection – malicious language processing, network traffic analysis, Anomaly detection - summarization - Question answering - Named entity recognition and relation extraction - IE using sequence labeling - Open problems (4)
TUTORIAL PRACTICE:
1. Identification of algorithmically generated domain names
2. Malware code analysis by constructing lexicon for malware and word analysis
3. Network traffic analysis
4. Mail spam detection using RNN and LSTM
5. Phishing URLs from phishtank using RNN
6. Part of speech tagging of malware using HMM
7. Word2Vec representation for malware / URLs
8. Named entity recognition for malware, vulnerabilities
Total L:45+P:30=75
TEXT BOOKS:
1. Daniel Jurafsky, James H. Martin, “Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition”, Prentice Hall, 2014.
2. Jacob Eisenstein, Introduction to Natural language processing, The MIT Press, 2019.
REFERENCES:
1. Christopher Manning, Hinrich Schütze, “Foundations of Statistical Natural Language Processing”, MIT Press, 2008.
2. James Allen, “Natural Language Understanding”, Addison Wesley, 1995.
20XCEL INFORMATION RETRIEVAL AND FILTERING
3 2 0 4
Prerequisites:
INTRODUCTION: Information Retrieval problem - Historical Perspectives - Goals of IR - The impact of the web on IR- Information Filtering (3)
INDEXING: Index construction: Inverted index, Hardware basics - Different indexing techniques - Index compression : Statistical properties of terms in information retrieval , Postings file compression (4)
RETRIEVAL MODELS: Similarity Measures and Ranking - Boolean Matching – Extended Boolean models - Ranked retrieval - Vector Space Models -Text-similarity metrics - TF-IDF (term frequency/inverse document frequency) weighting - Cosine similarity, Probabilistic Models, Language models - Query Operations - Query expansion and Relevance Feedback - Experimental Evaluation of IR: Performance metrics: recall, precision, and F-measure (8)
WEB SEARCH: IR Systems and the WWW - Search Engines: Spidering, Meta Crawler, Question answering, Link analysis - Hubs and Authorities, HITS algorithm, Duplicate Detection – Near Duplicate pages – Ranking based Evaluation metrics . (5)
RECOMMENDER SYSTEM: Goals of Recommender Systems - Content based Recommender Systems - Collaborative filtering Systems - Neighbourhood based approaches – Model based approaches – Matrix factorization approaches - Context – Aware Recommender Systems - Recommender System properties – Evaluation metrics - General goals of evaluation and metrics - Active learning n Recommender Systems – Multi criteria Recommender Systems (10)
TRUST IN RECOMMENDATION: Introduction - Computational Trust – Trust Propagation – Trust Metrics - Trust-Enhanced Recommender Systems – Privacy Preserving Recommendations (5)
ROBUST COLLABORATIVE RECOMMENDATION: Trade-offs in Attack model - Types of Attacks – Impact of Attacks – Attack Detection : Detection findings - Individual Attack Profile detection – Group attack profile detection – Strategies for Robust Recommender systems - Robust Recommendation Algorithms (10)
TUTORIAL PRACTICE:
1. Different retrieval models - Boolean, Vector space and Probability based retrieval.
2. Query refinement and relevant feedback techniques
3. Web based retrieval - Link based retrieval, combining content and link information
4. Building a Recommendation Engine – Collaborative, Content Based, Multi Criteria, Context aware
5. Matrix factorization and Dimension reduction approaches
6. Privacy Preserving and Attack Detection techniques
7. Multi Objective Recommender systems and Evaluation metrics
Total L:45+P:30=75
TEXT BOOKS:
1. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, “Introduction to Information Retrieval”, Cambridge University Press, 2012.
2. Stefan Büttcher, Charles L. A. Clarke, Gordon V. Cormack, “Information Retrieval – Implementing and Evaluating Search Engines “, The MIT Press, 2016
3 Francesco Ricci, Lior Rokach, Bracha Shapira, Paul B. Kantor, “Recommender Systems – Handbook”, Springer, 2015.
REFERENCES:
1. Ricardo Baeza-Yates and Berthier Ribeiro-Neto, “Modern Information Retrieval”, Pearson Education, 2010.
2. Charu C. Aggarwal , ”Recommender Systems: The Textbook”, Springer, 2016
20XCEM REINFORCEMENT LEARNING
3 2 0 4
Prerequisites:
REINFORCEMENT PROBLEM: Introduction - Elements of RL, History of RL- Evaluative feedback -Goals and rewards – Returns -Bandit learning: Upper-confidence - bound algorithms - Thompson sampling, online learning - Multi agent reinforcement learning (5)
MARKOV DECISION PROCESS (MDP): Value functions - Optimality Criterion in MDPs.- Partially Observed Markov Decision Process (4)
DYNAMIC PROGRAMMING (DP): Policy Evaluation- Policy Improvement - Value Iteration, asynchronous DP- Efficiency of DP- Stochastic DP. (5)
MONTE CARLO METHODS: Policy Evaluation- Policy Improvement- On-policy and off- policy Monte Carlo controls-Incremental implementation. (8)
TEMPORAL DIFFERENCE LEARNING (TD): TD-prediction- Optimality of TD - SARSA- Q-Learning – R- Learning-Actor-Critic Model- Unifying Monte Carlo and TD-Traces- Games. (8)
FUNCTION APPROXIMATION: Value prediction and control – Gradient Descent methods - Linear methods – Artificial Neural Network based approximation (9)
PLANNING AND LEARNING: Model based learning and planning - prioritized sweeping-Heuristic search. (6)
TUTORIAL PRACTICE:
1. Ranking of nodes of a graph using Q-Learning (PageRank, TrustRank, DistanceRank).
2. Implementing n-armed Bandit problem.
3. Finding shortest paths in graphs using RL.
4. Solving GridWorld problems.
5. RL for Stochastic grid word.
6. Automated Chess player.
7. Multi-agent system.
8. Distributed RL.
9. Policy search algorithm.
Total L:45+T:30=75
TEXT BOOKS:
1. Sutton R. S. and Barto A. G., "Reinforcement Learning: An Introduction", MIT Press, 2018.
2. Dimitri P. Bertsekas, "Reinforcement Learning and Optimal Control”, Athena Scientific, 2019
3. Csaba Szepesvári, “Algorithms for Reinforcement Learning”, Morgan & Claypool, 2010.
4. Masashi Sugiyama, “Statistical Reinforcement Learning : Modern Machine Learning Approaches”, CRC Press, 2015
REFERENCES:
1. Lattimore, T. and Szepesvári, C.” Bandit Algorithms”, Cambridge University Press, 2018.
2. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Pearson, 2020.
20XCEN DEEP LEARNING
3 2 0 4
Prerequisites:
Introduction: Basic concepts – Convex sets, convex functions – loss functions – Gradient descent – Variants - Perceptron – Activation functions - Geometric representation – Perceptron Convergence theorem (4)
Feed Forward Networks : Multi layer Perceptron – back propagation - Learning XOR – Auto encoder - Deep neural networks. (6)
Training neural Networks: Optimization methods for neural networks - Adagrad, Adadelta, rmsprop, adam, NAG - second order methods for training, Saddle point problem in neural networks, Regularization methods - dropout, batch normalization, Ridge and Lasso (10)
Convolutional networks structure – properties – Region based CNN - LeNet – Alex net (5)
Recurrent networks : Recurrent neural networks(RNN) – Gated Recurrent unit – Long Short Term Memory - Bidirectional RNNs - Deep recurrent network – Methodology – Applications (8)
Deep Learning Research :Linear Factor Models, variants of Autoencoders, Representational Learning, Structured probabilistic models for deep learning, Monte Carlo Methods, Generative adversarial networks - Deep generative models (9)
Applications :Malicious language processing- Malware and code analysis – Deep Phish - Big Data, Brain Computer Interface, Vision, IoT (3)
TUTORIAL PRACTICE:
1. Collect data sets from the url : http://deeplearning.net/datasets/
2. Use TensorFlow library for visualization of data sets in different domains and analysis:
a. Network intrusion detection
b. Classifying Phishing URLs from Phishtank using RNN and LSTM
c. DDOS attack detection
d. Malware analysis
e. HTTPS Network traffic analysis using RNN
f. SQL injection analysis
g. Collect tweets containing relevant information related to cyber-security and analyse using RNN
Total L:45+T:30=75
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, The MIT Press, 2016.
2. Yoshua Bengio, “Learning Deep Architectures for AI”, Foundations & Trends in Machine Learning, 2009.
REFERENCES:
1. Li Deng, Dong Yu, "Deep Learning: Methods and Applications", Now Publishers, 2014
2. Jon Krohn, "Deep Learning for Natural Language Processing: Applications of Deep Neural Networks to Machine Learning Tasks", Addison-Wesley Professional, 2017.
20XCEO RANDOMIZED ALGORITHMS
3 2 0 4
Prerequisites:
INTRODUCTION: Randomized algorithms, generation of random numbers, randomized quick sort, Karger’s min-cut algorithm Las Vegas and Monte Carlo algorithms, computational models and complexity classes. (5)
PROBABILISTIC INEQUALITIES: Union bound, Markov and Chebyshev inequalities-Applications- Occupancy problem, randomized selection- coupon collector’s problem, the Chernoff bound- routing in a parallel computer- a wiring problem. (6)
PROBABILISTIC METHOD: Overview of the method-maximum satisfiability – finding a large cut , Independent Sets (4)
MARKOV CHAINS AND RANDOM WALKS: Markov chains, Random walk on graphs – connectivity in undirected graphs – Expanders and rapidly mixing random walks, Probability amplification fo random walks on expanders (7)
DATA STRUCTURES AND GRAPH ALGORITHMS: Random Treaps, hashing – hash tables – perfect hashing, skip lists – Fast min-cut. (6)
ONLINE ALGORITHMS: Paging problem-adversary models- paging against an oblivious adversary-relating the adversaries-the adaptive online adversary, k-server problem. (4)
PARALLEL AND DISTRIBUTED ALGORITHMS: Sorting on a PRAM – Maximal Independent sets-parallel matching (5)
NUMBER THEORETIC ALGORITHMS: Polynomial roots and factoring, primality testing. (4)
DERANDOMIZATION: The method of Conditional Probabilities – Derandomizing max-cut algorithm, Constructing pairwise independent values modulo a prime – large cut. (4)
TUTORIAL PRACTICE:
1. Find solution for s-t min-cut problem adapting min cut algorithm.
2. Problems using treap data structure.
3. Problems using randomized hash table.
4. Comparison of performance analysis of Karger’s min cut with fast min-cut algorithms.
5. Randomized primality testing.
6. Problem using K-server on-line algorithms.
7. Real time application of parallel algorithms for maximum independent set.
Total L:45+TP:30=75
TEXT BOOKS:
1. Motwani R and Raghavan P, “Randomized Algorithms”, Cambridge University Press, 2014.
2. Michael Mitzenmacher and Eli Upfal, “Probability & Computing: Randomized Algorithms and Probabilistic Analysis”, Cambridge University Press, 2017.
REFERENCES:
1. Thomas H Cormen, Charles E Leiserson and Ronald L Rivest, “Introduction to Algorithms”, MIT Press, 2015
2. Notes on Randomized algorithms, James Aspens, Yale University, 2013,
20XCO1 GERMAN
3 2 0 4
Prerequisites:
INTRODUCTION TO VR AND AR: Overview of class, logistics, history of VR/AR.(5)
THE GRAPHICS PIPELINE AND OPENGL: Overview and Transformations: rotation, translation, scaling, model view matrix, projection matrix, Lighting and Shading.(7)
OPENGL SHADING LANGUAGE (GLSL): vertex and fragment shaders.(5)
Guten Appetit! – Learning: To learn about food, shop, converse; Vocabulary: related to the topic; Grammar: Sentence position, Accusative, Accusative with verbs. (6)
Tag fϋr Tag – Learning: To learn time related expressions, about family, ask excuse, fix appointments on phone; Vocabulary: related to the topic; Grammar: Preposition – am, im, um, von…bis, Possessive articles, Modalverbs. (6)
Zeit mit Freunden – Learning: To express birthdays, understand & write invitations, prepare dialogues; Vocabulary: related to the topic; Grammar: Past tense of haben & sein verbs, Accusative personal pronouns and prepositions.(6)
Kontakte – Learning: arrange appointments, understand instructions, letters & conversations; Vocabulary: related to the topic; Grammar: Dativ preposition & articles and Accusative possessivarticle. (6)
Meine Wohnung – Learning: To understand advertisements & describe flats; Vocabulary: related to the topic; Grammar: Adjectives & wechsel prepositions.(6)
TUTORIAL PRACTICE:
Listening and speaking practice for all the eight units
Total L: 45+T: 30=75
TEXT BOOKS:
1. Dengler,Stefanie et al.,, Netzwerk A1, Klett-Langenscheidt Gmbh, München, 2013.
2. Sandra Evans, Angela Pude, Franz Specht-Menschen A1–Hueber Verlag ,2012.
REFERENCES:
1. Hermann Funk, Christina Kuhn, Silke Demme, Studio d A1 , Goyal Publishers & Distributors Pvt. Ltd ,2009.
2. Rosa-Maria Dallapiazza, Eduard von Jan, Til Schönherr, Tangram Aktuell 1 (Deutsch als Fremdsprache) Max Hueber Verlag ,2004.
3. Christiane Lemcke und Lutz Rohrmann,’Grammatik Intensivtrainer A1’, Goyal Publishers & Distributors Pvt. Ltd., Delhi, 2012.
4. Heinz Griesbach – Dora Schulz, ‘Deutsche Sprachlehre fὒr Auslӓnder’, Max Hueber Verlag, 2004.
5. www.dw.de
20XCO2 VIRTUAL AND AUGMENTED REALITY
3 2 0 4
INTRODUCTION TO VR AND AR: Overview of class, logistics, history of VR/AR. (5)
THE GRAPHICS PIPELINE AND OPENGL: Overview and Transformations: rotation, translation, scaling, model view matrix, projection matrix, Lighting and Shading.(7)
OPENGL SHADING LANGUAGE (GLSL): vertex and fragment shaders.(5)
THE HUMAN VISUAL SYSTEM: Perception of depth, color, contrast, resolution, Stereo Rendering.(5)
HEAD MOUNTED DISPLAY OPTICS: Magnifier designs, stereo rendering for HMDs, lens distortion correction, advanced HMD optics.(7)
INERTIAL MEASUREMENTS UNITS: gyros, accelerometers, magnetometers, sensor fusion, complementary filter, Arduino(6)
POSITIONAL TRACKING: Tracking with the light house, advanced positional tracking. SPATIAL SOUND.(5)
PANORAMIC IMAGING AND CINEMATIC VR: Engines and Other Aspects of VR (latency, eye tracking, post-rendering warp)(5)
TUTORIAL PRACTICE:
1. Lab: Hello, WebGL!
2. Lighting and shading with GLSL
3. Stereo rendering, anaglyph
4. Building Own Head Mounted Display
5. Build Your Own IMU, Arduino Programming
6. Positional Tracking
7. Spatial Sound
8. Content creation with unity (Optional)
Total L: 45+T: 30=75
TEXT BOOKS:
1. Marschner, Shirley, “Fundamentals of Computer Graphics”, CRC Press, 2016.
2. La Valle, “Virtual Reality”, Cambridge University Press, 2016.
REFERENCES:
1. Jos Dirksen, "Learning Three.js: The JavaScript 3D Library for WebGL", Packt Publishing, 2013
2. Jacobo Rodriguez, "GLSL Essentials: Enrich your 3D scenes with the power of GLSL!", Packt Publishing, 2013.
20XCO3 COMPUTATIONAL FOUNDATION FOR ROBOTICS
Prerequisites:
3 2 0 4
INTRODUCTION: Robots and their applications in industry, mobile and service applications, Configurations of industrial and mobile robots. Robot controllers, drives, actuators and sensors, Spatial descriptions and Transformations: Positions, orientations and frames, Mappings, translations, rotations and transformations, transformation arithmetic, Transform equations, representation of orientation, free vector transformation, Introduction to ROS.(12)
FORWARD AND INVERSE KINEMATICS: Link co-ordinates, D-H Representation, Arm equation -Two axis and three axis, robots, Inverse kinematics of two axis and three axis robots, Maneuverability – Workspace – Control.(15)
LOCALIZATION AND MAPPING: Challenges in mobile robots, Introduction - Bayes filter – Kalman Filter - Extended Kalman Filter - Information Filter - Histogram Filter - Particle Filter –Localization- Map Representation- Probabilistic Map based Localization-Monte carlo localization- Landmark based navigation-Globally unique localization- Positioning beacon systems- Route based localization – Mapping – Metrical maps - Grid maps - Sector maps – Hybrid Maps – SLAM(18)
DECISION MAKING: planning and dynamic programming principles, Configuration space abstraction, Sampling-based planners for mobile robots, Feedback-based planning for mobile robots- Feedback in discrete spaces, wave-front functions, Potential and navigation functions for mobile robots.(15)
PLANNING AND NAVIGATION: Overview of the three computational components and their interaction, sensing, planning, and control - Global path planning – A* Algorithm - local path planning - Road map path planning- Cell decomposition path planning-Potential field path planning-Obstacle avoidance – Path control. Markov Decision Process (MDP) in discrete spaces, optimal control and steering methods- Nonlinear optimization and gradient methods.(15)
TUTORIAL PRACTICE:
1. Robot Operation System (ROS) basics
2. Localization
3. Path planning and navigation
4. Multi-robot coordination
Total L: 45+T: 30=75
TEXT BOOKS:
1. John J. Craig, Introduction to Robotics: Mechanics and Control, Pearson Education Company, 2008
2. Steven M. LaValle, Planning Algorithms, Cambridge University Press, 2006
3. Howie Choset, Kevin M. Lynch, Seth Hutchinson, George A. Kantor, Wolfram Burgard, Lydia E. Kavraki, Sebastian Thrun, Principles of Robot Motion Theory, Algorithms, and Implementations (PRMTAI), MIT Press, 2005.
REFERENCES:
1. Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modeling and Control”, Wiley, 2006.
2. Kevin M. Lynch and Frank C. Park, “Modern Robotics: Mechanics, Planning, and Control”, Cambridge University Press, 2017.
3. Roland Siegwart, Illah Reza Nourbakhsh and Davide Scaramuzza, “Introduction to Autonomous Mobile Robots”, MIT Press, 2004
20XCO4 STOCHASTIC MODELS
Prerequisites:
3 2 0 4
STOCHASTIC PROCESSES: Introduction – Classification of Stochastic Processes – Markov Chain: Introduction -Transition Probability Matrices – Chapman Kolmogorov Equations - Classification of States – Limit Theorems – Branching Processes – Time Reversible Markov chains – Markov Decision Processes - Applications.(13)
CONTINUOUS TIME MARKOV CHAINS: Introduction – Poisson Process - Birth and Death Processes – Kolmogorov Differential Equations – Pure Birth Process - Pure Death Process - Applications.(10)
RENEWAL THEORY: Introduction – Distribution - Renewal Theorems - Residual and Excess Life Times -Alternating Renewal Process - Renewal Reward Processes – Regenerative Processes.(8)
GENERAL QUEUEING MODELS: Single and Multi server Poisson Queues - Single Server Queue with Poisson input and general service M / G/1 – General input and exponential service – G/M/1 Queueing model.(9)
BROWNIAN MOTION: First Passage time distribution – The maximum of a Brownian Motion – The Zeros of Brownian Motion – Brownian Motion with Drift - Geometric Brownian Motion.(5)
TUTORIAL PRACTICE:
1. Applications and solving problems of discrete time Markov chain, and Markov decision processes
2. Applications and solving problems of continuous time Markov chain
3. Case studies on general queueing models
4. Application problems on Brownian motion.
Total L: 45+T: 30=75
TEXT BOOKS:
1. Mark A Pinsky, Samuel Karlin, “An Introduction to Stochastic Modelling”, Academic Press, 2011.
2. Nicolas Privault, “ Understanding Markov Chains”, Springer, 2018.
3. Roy D.Yates and David J. Goodman, “Probability and Stochastic Processes – A friendly Introduction for Electrical and Computer Engineers”, John Wiley & Sons, 2014.
REFERENCES:
1. SaeedGhahramani, “Fundamentals of Probability with Stochastic Processes”, Pearson, 2014.
2. Sheldon M. Ross, “Introduction to Probability Models”, Academic Press, 2014.
3. Medhi J., “Stochastic Processes”, New Age International Publishers, 2014.
4. Samuel Karlin and Howard E.Taylor, “A First course in Stochastic Processes”, Academic Press, 2011.
5. Gross.D and Harris C.M, “Fundamentals of Queueing theory”, John Wiley & Sons, 2013.
20XCO5 PRINCIPLES OF MANAGEMENT
3 2 0 4
PRINCIPLES OF MANAGEMENT: Meaning, Definition and Significance of Management, Basic Functions of Management – Planning, Organizing, Staffing, Directing and Controlling. Organizational Environment – Social, Economic, Technological and Political. Corporate Social Responsibility - Case discussion(8)
INDUSTRIAL AND BUSINESS ORGANIZATION: Growth of Industries (Small Scale, Medium Scale and Large Scale Industries). Forms of Business Organizations. Resource Management – Internal and External Sources.(7)
ORGANIZATIONAL BEHAVIOUR: Significance of OB, Impact of culture on organization. Role of leadership and leadership styles. Personality and Motivational Theories. Attitudes, Values and Perceptions at work - Case discussion(7)
GROUP BEHAVIOUR: Group dynamics, Group formation and development, group structure and group cohesiveness. Informal organization – Sociometry – Interaction analysis - Exercises(8)
GLOBALISATION: Issues for global competitiveness, proactive and reactive forces of globalization. Cross cultural management – Management of work force diversity.(5)
HUMAN RESOURCE MANAGEMENT: and Functions, Selection and Placement, Training and Development – Conflict management – Stress management - Human resource management in global environment - Human resource information system(HRIS) - Case discussion. (10)
TUTORIAL PRACTICE:
Case studies
Total L: 45+T: 30=75
TEXT BOOKS:
1. Harold Koontz, Heinz Weihrich and Ramachandra Aryasri, “Principles of Management”, Tata McGraw Hill, 2014.
2. Mamoria CB, “Personnel Management”, Sultan Chand & Sons, 2005.
REFERENCES:
1. John W Newstrom and Keith Davis, “Organizational Behavior”, Tata McGraw Hill, 2010.
2. Stephen P Robbins, ”Organisational behavior”, Prentice Hall, 2010.
3. Khanna O P, “Industrial Engineering & Management”, Dhanpat Rai Publications, 2010.
20XCO6 ENVIRONMENTAL SCIENCE AND GREEN COMPUTING
3 2 0 4
NATURAL RESOURCES, ECOSYSTEMS AND BIODIVERSITY: Environment, Definition, Scope and importance, Forest resources, Use and overexploitation, Water resources: Use and over utilization. Eco system; Structure and functions of an eco system, energy flow in the eco system. Bio Diversity; values of biodiversity, biodiversity at global, national and local levels – threats to bio diversity. Conservation of bio diversity – In-situ & Ex-situ conservation.(9)
ENERGY SOURCES: Growing energy needs, Renewable and non renewable energy sources, Hydro power, Solar Power: Photovoltaic Energy – Motivation for going Solar – Solar Electricity – PV cells. Wind Power: – Using the Wind: Generating Power at Remote Sites,– Measuring the Wind – Estimating the output. Use of alternate energy sources.(9)
SOCIAL ISSUES AND THE ENVIRONMENT: From unsustainable to sustainable development, Urban problems related to energy, Water conservation, Rain water harvesting, Watershed management, Environment and human health, Role of information technology in environment and human health. Environment Protection Act: Air (Prevention and Control of Pollution) Act – Water Act, Forest Conservation Act, Wildlife Protection Act, Introduction to EIA and ISO 14000.(9)
ENVIRONMENTAL POLLUTION AND DISASTER MANAGEMENT: Definition – causes, effects and control measures of air pollution, water pollution, soil pollution, noise pollution, thermal pollution and nuclear hazards. Disaster management - floods, earthquake, cyclone and landslides. Solid waste management - causes, effects and control measures of municipal solid wastes (Biomedical wastes, hazardous wastes). Role of an individual in prevention of pollution.(9)
GLOBAL ATMOSPHERIC CHANGE & GREEN FUNDAMENTALS: The Atmosphere of Earth – Global Temperature – Global Energy Balance , The Greenhouse Effect - Environmental Issues and Green Computing, Electronic waste management: Introduction;- Environment and society, producer responsibility legislation – the Waste Electrical and Electronic Equipment (WEEE) directive, Materials Composition of WEEE: Mobile Phones – Television – Washing Machines, - Current and new electronic waste recycling technology- Future perspectives of electronic scrap. (9)
TUTORIAL PRACTICE:
Case studies
Total L: 45+T: 30=75
TEXT BOOKS:
1. Mackenzie L. Davis, and David A. Cornwell, “Introduction to Environmental Engineering”, Tata McGraw Hill, 2010.
2. Chetan Singh Solanki, “Solar Photovoltaics”, PHI, 2011.
3. Siraj Ahmed, “Wind Energy : Theory and Practice”, PHI, 2011.
4. Mahajan S. P. Pollution Control in Process Industries, Tata McGraw Hill, 1985.
5. R. E. Hester and R. M. Harrison, “Electronic Waste Management”, Royal Society of Chemistry, 2009.
REFERENCES:
1. William W. Nazarodd and Lisa Alvarez-Cohen, “Environmental Engineering Science”, Wiley-India, 2010
2. Anubha Kaushik and Kaushik C P, “Environmental Science and Engineering”, New Age International, 2005.
3. Martha Maeda, “How to Solar Power your Home”, Atlantic Publishing Group, 2011.
4. Paul Gipe, “Wind Power – Renewable Energy for Home, Farm and Business”, Sterling Hill Publications, 2008.
5. Klaus Hieronymi, RamzyKahhat, Eric Williams, “E-Waste Management : From Waste to resource”, Routledge – Taylor and Francis, New York, 2012.
6. Diane GowMcdilda, “The Everything Green Living Book”, Adams Media, 2007.
20XCO7 COMPUTATIONAL FINANCE
Prerequisites:
3 2 0 4
MATHEMATICAL PRELIMINARIES: Conditional expectation – Sigma Algebra – Filtrations, Stochastic Calculus - Random walk – Brownian motion – Martingales – Ito’s Lemma.(5)
FINANCIAL DERIVATIVES: Law of one price – Risk neutral pricing – Arbitrage and Hedging – Financial Products and capital markets – Futures, Forwards and options – Options pricing problem. Risk free assets – risky assets.(8)
BASIC OPTIONS THEORY: Definitions – Pay off diagrams – Single period binomial options theory – Multi period binomial options theory – Real options – American options, Simulation methods for options pricing – Random variable generation – simulation of stochastic processes. Black Schole’s formula.(11)
PORTFOLIO THEORY: Introduction - Portfolio theory with matrix algebra - Review of constrained optimization methods, Markowitz algorithm, Markowitz Algorithm using the solver and matrix algebra – Portfolio choice and linear pricing – Statistical analysis of efficient portfolios. Sharpe’s single index model(11)
THE CAPITAL ASSET PRICING (CAP) AND RISK BUDGETING: Mean variance portfolio theory – Asset returns – Variance as a risk measure - The one and two fund theorems, The capital market line – CAP as a pricing formula – Systematic and unsystematic risk – Euler’s theorem – Asset contributions to volatility – beta as a measure of portfolio risk , Limitations of mathematical models in finance.(10)
TUTORIAL PRACTICE:
1. Problems using Capital Asset Pricing model.
2. Plot time series data and find outliers
3. Monte Carlo Simulation of options pricing
4. Sharpe’s single index model
5. Black Schole’s model
6. CAP model
Total L: 45+T: 30=75
REFERENCES:
1. Marek Capinski, Tomasz Zastawniak, “Mathematics for Finance: A Introduction to Financial engineering”, Springer, 2011.
2. David Ruppert, “Statistics and Data Analysis for Financial Engineering”, Springer-Verlag, 2011.
3. Edwin J. Elton, Martin J. Gruber, Stephen J. Brown and William N. Goetzmann “Modern Portfolio Theory and Investment Analysis”, Wiley, 2014.
4. Simon Benninga, “Financial Modeling”, MIT Press, 2014.
5. Steven E Shreve, “Stochastic Calculus for Finance – I” , Springer, 2012
6. Glasserman Paul, “Monte Carlo Methods in financial Engineering”, Springer Science and Business media, 2013.
20XCO8 ENTERPRENEURSHIP
3 2 0 4
INTRODUCTION TO ENTREPRENEURSHIP: – Characteristics and Functions of an Entrepreneur – Common myths about entrepreneurs – Importance or Entrepreneurship.(5)
CREATIVITY AND INNOVATION: The role of creativity – The innovation Process – Sources of New Ideas – Methods of Generating Ideas – Creative Problem Solving – Entrepreneurial Process.(6)
DEVELOPING AN EFFECTIVE BUSINESS MODEL: The Importance of a Business Model – Starting a small scale industry - Components of an Effective Business Model.(5)
APPRAISAL OF PROJECTS: Importance of Evaluating Various options and future investments- Entrepreneurship incentives and subsidies – Appraisal Techniques.(8)
FORMS OF BUSINESS ORGANIZATION: Sole Proprietorship – Partnership – Limited liability partnership - Joint Stock Companies and Cooperatives. (4)
FINANCING THE NEW VENTURE: Determining Financial Needs – Sources of Financing – Equity and Debt Funding – Case studies in Evaluating Financial Performance.(8)
THE MARKETING FUNCTION: Industry Analysis – Competitor Analysis – Marketing Research for the New Venture – Defining the Purpose or Objectives – Gathering Data from Secondary Sources – Gathering Information from Primary Sources – Analyzing and Interpreting the Results – The Marketing Process.(5)
INTELLECTUAL PROPERTY PROTECTION AND ETH ICS: Patents – Copyright - Trademark- Geographical indications – Ethical and social responsibility and challenges. (4)
TUTORIAL PRACTICE:
Case studies
Total L: 45+T: 30=75
TEXT BOOKS:
1. Donald F.Kuratko and Richard M.Hodgetts, “Entrepreneurship”, South-Western, 2003.
2. The Dynamics of Entrepreneurial Development and Management, Vasant Desai, Himalaya Publishing House, 2010.
REFERENCES:
1. S.L.Gupta, Arun Mittal, “Entrepreneurship Development”, International Book House, 2012.
2. G. S. Sudha, “Management and Entrepreneurship Development”, Indus Valley Publication, 2009.
3. V. Badi, N. V. Badi , Business Ethics, R, Vrinda Publication, 2012.
4. Prasanna Chandra Projects- Planning, Analysis, Financing, Implementation andreview, TATA McGraw Hill, 2012
20XCO9 STATISTICAL LEARNING
Prerequisites:
3 2 0 4
THEORETICAL FOUNDATIONS: Function Spaces: Banach Spaces, Cauchy Sequences, Holder spaces, Sobolev spaces, reproducing kernel Hilbert spaces (RKHS),Concentration of Measure.(10)
LINEAR REGRESSION: Low Dimensional Linear Regression, Ridge Regression, Lasso Regression.(8)
NONPARAMETRIC REGRESSION : Estimators, Polynomial Estimators, Linear Smoothers, Cross Validation, Data Splitting, Additive Models, SpAM algorithm(7)
LINEAR CLASSIFICATION: Review of Classification Models, Newton’s Method for Logistic Regression, Comparison of Logistic Regression with Linear Discriminant Analysis, Regularized Logistic Regression, SVM.(7)
NON-PARAMETRIC CLASSIFICATION: Plugin methods, k-NN, Boosting.(6)
MINIMAX RISK: Bounds of minimax risk, Le Cam’s method, Fano’s method, Tsybakov’s method, Hypercubes.(7)
TUTORIAL PRACTICE:
Solve the following problems using R
1. Auto Regression, Ridge Regression and Lasso Regression for predictions.
2. Kernel PCA for non-linear datasets
3. Non linear SVM using different kernel functions
4. Classification using LDA and boosting
Total L: 45+T: 30=75
TEXT BOOKS:
1. Gareth James, Daniela Witten, Trevor Hastie, Robert Tibshirani, “An introduction to Statistical learning”, Springer, 2013.
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, “Elements of Statistical Learning: Data Mining, Inference and Prediction”, Springer, 2013.
REFERENCES:
1. Vladimir N Vapnik, “Statistical learning theory”, Wiley, 1998.
2. Robert Schapire, Yoav Freund, “Boosting : Foundations and Algorithms”, The MIT Press, 2012.
20XCOA MATHEMATICAL MODELLING
Prerequisites:
3 2 0 4
INTRODUCTION TO MODELING: Modeling process, Overview of different kinds of model.(3)
EMPIRICAL MODELING WITH DATA FITTING: Error function, least squares method; fitting data with polynomials and splines.(4)
CAUSAL MODELING AND FORECASTING: Introduction, Modeling the causal time series, forecasting by regression analysis, predictions by regression. Planning, development and maintenance of linear models, trend analysis, modeling seasonality and trend, trend removal and cyclical analysis, decomposition analysis. Modeling financial time series. Econometrics and time series models. Non seasonal models: ARIMA process for univariate and multivariate. (8)
INVENTORY MODELS: Classic Economic Order Quantity (EOQ) Model, EOQ with price breaks, Multi-item EOQ with Storage limitation, Dynamic EOQ , Probabilistic EOQ model , No setup model, Setup model (s-S Policy).(7)
PORTFOLIO MODELING AND ANALYSIS: Portfolios, returns and risk, risk-reward analysis, asset pricing models, mean variance portfolio optimization, Markowitz model and efficient frontier calculation algorithm, Capital Asset Pricing Models (CAPM).(8)
MODELING WITH BIOINFORMATICS: Introduction, Biological data- types, mode of collection, documentation and submission. Sequence alignment- Definition, significance, dot matrix method, dynamic programming- Global and local alignment tools, scoring matrices and gap penalties. Multiple sequence alignment: Iterative methods. Hidden Markovian models, statistical methods, position specific scoring matrices.(15)
TUTORIAL PRACTICE:
1. Algebraic Models: Linear, Quadratic, and Exponential.
2. Polynomial curve fitting and cubic spline curve fitting.
3. Time series analysis and forecasting models.
4. Portfolio optimization models.
5. Cox-Ross-Rubinstein (CRR) model.
6. Risk analysis models.
7. Pair wise sequence alignment using dynamic programming.
8. Multiple sequence alignment using Hidden Markovian models
Total L: 45+T: 30=75
TEXT BOOKS:
1. Giordano F R, Weir M D and Fox W P,“A First Course in Mathematical Modeling”, Brooks/Cole, 2008.
2. Mount, DW, “Bioinformatics Sequence and genome analysis”, Cold Spring Harbor Laboratory, 2004.
REFERENCES:
1. Hamdy A Taha, “Operation Research- An Introduction”, Pearson Education, 2014.
2. Christoffersen P, “ Elements of Financial Risk Management”, Academic Press, 2012.
3. Capinski M. and Zastawniak T,“Mathematics for Finance: An Introduction to Financial Engineering”, Springer, 2010.
4. Alexander Isaev, Introduction to Mathematical Methods in Bioinformatics, Springer, 2006.
20XCOB ADVERSARIAL MACHINE LEARNING
3 2 0 4
Prerequisites:
Introduction: supervised, un-supervised and Reinforcement learning in Adversarial setting – Categories of Attacks on machine learning, based on attack time, Information available to attacker – attacker goals (5)
Decision time attacks – Attacks at decision time – Evasion attacks – Examples – modelling – white box and black box decision time attacks – Defending decision time attacks – Hardening supervised learning – Optimal evasion robust classification – Approximately hardening classifiers against decision time attacks – Decision randomization (10)
Poisoning attacks – Modelling poisoning attacks – attacks on binary classification – Poisoning on unsupervised learning – Poisoning attack on matrix completion – General framework on poisoning attacks- Black box poisoning attacks (10)
Defending against poisoning attacks – Robust learning through sub sampling – Outlier removal – Trimmed optimization – Robust matrix factorization – Efficient algorithm (10)
Adversarial deep learning - Generative Adversarial Networks (4)
Case studies – Network intrusion detection, Malware detection, Natural Language Processing, Spam filtering, Image classification, Object detection and segmentation (6)
TUTORIAL PRACTICE:
1. Poisoning attacks against SVM
2. Evasion attacks against machine learning at test time
3. Poisoning of deep learning algorithms with back gradient optimization
4. Security evaluation of pattern classifiers under attack
Total L:45+T:30=75
TEXT BOOKS:
1.Yevgeniy Vorobeychik, Murat Kantarcioglu, Adversarial Machine Learning, Morgan & claypool Publishers, 2018
2. Ian Goodfellow and Yoshua Bengio and Aaron Courville, Deep learning MIT Press, 2016
REFERENCES:
1. Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar, "Adversarial Machine Learning" Cambridge university press, 2019
2. Qiaosong Wang, "Manifold, Deep and Adversarial Learning for Visual Object Detection" ProQuest Dissertations & Theses, 2019
20XCOC NETWORK SCIENCE
3 2 0 4
Prerequisites:
INTRODUCTION: Basics of networks and graphs, random network model - degree distribution, evolution, small world property, six degrees of separation, Watts-Strogatz model, local clustering coefficient, random networks and network science. (5)
BARABÁSI-ALBERT MODEL:Growth and preferential attachment, Barabási-Albert model, degree dynamics, degree distribution, diameter and the clustering coefficient, preferential attachment - absence of growth, measure, non-linearity, the origins. (8)
SCALE-FREE PROPERTY: Power laws and scale-free networks, Hubs, Universality, Ultra-small property, role of the degree exponent, Generating networks with a pre-defined degree distribution. (10)
EVOLVING NETWORKS: Bianconi-Barabási model, measuring fitness, Bose-Einstein condensation, evolving networks. (6)
DEGREE CORRELATIONS: TAssortativity and disassortativity, Measuring degree correlations, Structural cutoffs, Degree correlations in real networks, Generating correlated networks, impact of degree correlations. (8)
NETWORK ROBUSTNESS: Percolation theory, robustness of scale-free networks, attack tolerance, cascading failures, modeling cascading failures, building robustness. (8)
TUTORIAL PRACTICE:
1. Implementation of Barabási-Albert model.
2. Implementation of Watts-Strogatz model.
3. Implementation of Bianconi-Barabási model.
4. Obtaining Degree correlations in real networks.
5. Case studies of the theory concepts on real networks.
Total L:45+T:30=75
TEXT BOOKS:
1. Albert-László Barabási, “Network Science”, Cambridge University Press, 2020.
REFERENCES:
1. Estrada, E., Fox, M., Higham, D.J, Oppo, G.L., “Network Science - Complexity in Nature and Technology”, Springer, 2010.
2. Ted G. Lewis, “Network Science: Theory and Practice”, John Wiley& Sons, 2013.
20XCOD SOFTWARE PATTERNS
3 2 0 4
Prerequisites:
INTRODUCTION TO PATTERNS: Reusable object oriented software, Motivation, Best design practices of object oriented software, Coupling and Cohesion, Types of Cohesion and Coupling, Benefits of patterns, Definition of a Pattern, Types, Pattern description, Pattern Language, IDIOMS, Framework, Architecture. (6)
DESIGN PATTERNS: Creational patterns – Abstract factory, Builder, Factory method, Prototype, Singleton, Structural patterns – Adapter, Bridge, Composite, Decorator, Façade, Flyweight, Proxy, Behavioral patterns – Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template method, Visitor, Chain of Responsibility, Case Studies. (15)
ARCHITECTURAL PATTERNS: From Mud to Structure – Layers, Pipes and Filters, Blackboard, Distributed systems – Broker, Interactive Systems – Model View Controller (MVC), Presentation Abstraction Control, Adaptable Systems – Reflection, Microkernel. Anti-Patterns. (13)
REFACTORING: What is refactoring, Principles in refactoring, Bad smells in code, Refactoring Techniques - Composing methods, Moving features between objects, Organizing data, Simplifying conditional expressions, Making method calls simpler, Dealing with generalization. Design Refactoring – Technical Debt, Design Smells, Abstraction Smells, Encapsulation Smells, Modularization Smells, Hierarchy Smells, Architectural Refactoring. Refactoring Tools. (11)
TUTORIAL PRACTICE:
1. Developing object oriented systems using Design Patterns.
2. Designing and giving architectural solutions to real time systems using Architectural Patterns.
3. Refactoring open source projects using Refactoring tools.
4. Developing simple refactoring tools.
5. Adopt new refactoring techniques to make the implementation more reusable.
Total L:45+T:30=75
TEXT BOOKS:
1. Erich Gamma, Richard Helm, Ralph Johnsons and John Vlissides, “Design Patterns: Elements of Reusable Object-Oriented Software”, Pearson Education, 2009.
2. Frank Buschman, Regine Meunier, Hans Rohnert, Peter Sommerlad and Michael Stal, “Pattern-Oriented Software Architecture: A System of Patterns”, John Wiley, 2011.
3. Martin Fowler, Kent Beck, William Opdyke, Don Roberts, “Refactoring: Improving the Design of Existing Code”, Addison-Wesley Longman, 2012.
REFERENCES:
1. Sherif Yacoub, Hany Ammar, “Pattern-Oriented Analysis and Design: Composing Patterns to Design Software Systems”, Pearson Addison-Wesley, 2003.
2. Girish Suryanarayana, Ganesh Samarthyam, Tushar Sharma, “Refactoring for Software Design Smells: Managing Technical Debt”, Morgan Kaufmann Publishers, Elsevier Inc., 2014.