MX Graduate Courses

ICS 501: Foundations of Artificial Intelligence (3-0-3)
Fundamental concepts and techniques of intelligent systems.  Principles and methods for heuristic search, knowledge representation, problem solving, planning and reasoning with uncertainty, game and adversarial search and their application to building intelligent systems in a variety of domains. Basics of machine learning, visual perception and natural language processing.  Introduction to AI programming.
Note:  Cannot be taken for credit with ICS-381.

ICS 502: Machine Learning (3-0-3)
Introduction to machine learning; supervised learning (linear regression, logistic regression, classification, support vector machines, kernel methods, decision tree, Bayesian methods, ensemble learning, neural networks); unsupervised learning (clustering, EM, mixture models, kernel methods, dimensionality reduction); learning theory (bias/variance tradeoffs); and reinforcement learning and adaptive control. 
Note:  Cannot be taken for credit with ICS-485.

ICS 503: Evolutionary Computation and Global Optimization (3-0-3)

An introduction to a wide variety of robust optimization algorithms based on the theme of nature inspired optimization techniques. Computational implementation single-state methods such as Simulated Annealing  and Tabu Search ; and population-based methods such as Genetic Algorithms, Particle Swarm, and Ant Colony. Theory including representations, landscapes, epistasis, code bloat, diversity, and problem structure is discussed.  Applications to optimization, machine learning, software development, and others. 

 
ICS 504: Deep Learning (3-0-3)
Deep Learning models and their applications in real world.  Foundations of deep learning networks training and optimization. Deep learning models for spatial and temporal data processing. Analysis of prominent deep learning models such as Convolutional Neural Networks (CNNs), Recurrent and Recursive Networks, Long-Short Term Memory (LSTM), Residuals Networks, and Generative Adversarial Networks (GANs). One-Shot Learning and Deep Reinforcement Learning. 
Note:  Cannot be taken for credit with ICS-471.

ICS 505: Computer Vision (3-0-3)
Taxonomy of computer vision tasks, Applications of computer vision, Image representation in the spatial and frequency domains, Image formation, Image filtering, Feature detection and matching, Image segmentation, Image classification, Object detection, Image alignment and stitching, Motion estimation and tracking, Depth estimation, Deep learning for computer vision.
Note:  Cannot be taken for credit with ICS-483.

ICS 506: Natural Language Processing (3-0-3)
Natural language processing (NLP) fundamentals, Language modeling, Vector space semantics and Embeddings, Sequence labelling, Syntactic parsing, semantic analysis, Information Extraction, Machine translation, Discourse Coherence, Question Answering, Dialogue Systems and Chatbots, and Natural language summarization. 

Note:  Cannot be taken for credit with ICS-472.

ICS 619: Project (6-0-6)
A graduate student will arrange with a faculty member to conduct an industrial research project related to the Artificial Intelligence and Machine Learning field of the study. Subsequently the students shall acquire skills and gain experiences in developing and running actual industry-based project. This project culminates in the writing of a technical report, and an oral technical presentation in front of a board of professors and industry experts.

 

SWE 545: Secure Software Development     (3-0-3)
Security in requirements engineering; Secure designs; Risk analysis; The SQUARE Process Model; Threat modeling; Defensive coding; Software protection; Fuzzing; Static analysis and security assessment; Memory leaks, buffer and heap overflow attacks, injection attacks.
Note: Cannot be taken for credit with SWE 445

 

SEC 511: Principles of Information Assurance and Security     (3-0-3)
Introduction to security and information assurance. Information confidentiality, availability, protection, and integrity. Security systems lifecycle. Risks, attacks, and the need for security. Legal, ethical, and professional issues in information security. Risk management including identification and assessment. Security technologies and tools. Security laws, audit and control. Cryptography foundations, algorithms and applications. Physical security, security and personnel, security implementation and management. Securing critical infrastructure. Trust and security in collaborative environments.
 

SEC 521: Network Security     (3-0-3)
Network infrastructure security issues, including perimeter security defences, firewalls, virtual private networks, intrusion detection systems, wireless security, and network security auditing tools. Secure network applications. Network security protocols such as SSL, SSL/TLS, SSH, Kerberos, IPSec, IKE. Network threats and countermeasures. Network auditing and scanning. VoIP Security. Remote exploitation and penetration techniques. Network support for securing critical infrastructure. Design and development of software-based network security modules and tools based on hands-on experiences and state-of-the-art technologies.
 

SEC 524: Computer and Network Forensics    (3-0-3)
Methodical approaches for collecting and preserving evidence of computer crimes, laws/regulation, and industry standards. Hands-on experience on identifying, analyzing, recreating, and addressing cyber based crimes. Ethical issues associated with information systems security. Foundational concepts such as file system structures, MAC times, and network protocols. Use of tools for evidence recovery. Use of established forensic methods in the handling of electronic evidence. Rigorous audit/logging and date archival practices. Prevention, detection, apprehension, and prosecution of security violators and cyber criminals, and general legal issues.
 

SEC 528: Security in Wireless Networks   (3-0-3)
Security of wireless networks such as cellular networks, wireless LANs, mobile ad hoc networks, wireless mesh networks, and sensor networks. Overview of wireless networks. Study of threats and types of attacks, including attacks on MAC protocols. Selfish and malicious behavior in wireless routing protocols. Countermeasures/solutions and their limitations. Encryption and authentication. Secure hand-off techniques. Energy-aware security mechanisms. Secure multicasting. Key pre-distribution and management in wireless networks.
 

SEC 540: Cryptography and Blockchain Applications    (3-0-3) 
Secret key encryption; Block and stream ciphers, Encryption standards;  Number theory: Divisibility, Modular arithmetic, Group theory and Finite fields; Public key encryption:  RSA, ElGamal and Rabin cryptosystems; Diffie-Hellman key exchange; Cryptographically secure hashing; Authentication and digital signatures; Digital signature standard (DSS), Randomized encryption; Cryptocurrency, Blockchain models and applications. Security issues and their solutions in Blockchain models and applications. Blockchain payment networks.
Note: Cannot be taken for credit with ICS 440
 

SEC 542: Penetration Testing and Ethical Hacking     (3-0-3)
Introduction to penetration testing and ethical hacking, requirements and legal issues, setting up virtual lab; Exploring Kali Linux and Metasploit framework, hacking and penetration testing phases; Information gathering through passive and active reconnaissance, footprinting, social engineering, port scanning; Advanced fuzzing techniques; Exploitation, password attacks and gaining access to remote services; Web penetration testing and web-based exploitation; Maintaining access with backdoors and rootkits; Bypassing defense applications; Wireless and mobile device hacking techniques; Writing penetration testing report; Tools and programming available for penetration testers in both Windows and Linux platforms such as Kali Linux, OpenVAS, Burp, NMAP, Netcat, Python, etc.
Note: Cannot be taken for credit with ICS 442
 

SEC 619 Project       (0-0-6)
A graduate student will arrange with a faculty member to conduct an industrial research project related to the cybersecurity as the field of the study. Subsequently the students shall acquire skills and gain experiences in developing and running actual industry-based project. This project culminates in the writing of a technical report, and an oral technical presentation in front of a board of professors and industry experts.