Syllabuses - PG

CS887 - Research Topics in Cyber Security

TIMETABLETEACHING MATERIAL
Credits10
Level5
SemesterSemester 2
Availability
Prerequisites
  • Information Security Fundamentals
     
Learning Activities Breakdown
Items of Assessment2
Assessment100% Coursework
LecturerPejman Saeghe

Aims and Objectives

Learning Outcomes

  1. Students should have a deep understanding of the state of the art in two different topic areas within cyber security based on the current research literature.
  2. Students should be able to read, understand, analyse, and evaluate  top academic papers in cyber security.
  3. Students should be able to clearly and concisely communicate research topics in cyber security to their peers and colleagues through engagement with the original literature via both reports and presentations.
  4. Students should be able to create new topics and questions for discussion by analysing gaps and potential improvements in the current research literature.
  5. Students should be able to place research topics in cyber security in their historical and current contexts and critique them effectively.

Transferable skills which will be developed include:

Verbal communication skills

Critical analysis and critique

Written communication skills

Syllabus

The aim of this class is to provide an in depth look at a variety of advanced topics in information security informed by students’ own interests. Students will also be briefly introduced to a much wider variety of advanced topics informed by the interests of their peers. This will be achieved by direct engagement with two original research papers selected by each student and the related literature and by engaging with the presentations of the other students on their chosen papers. Papers are selected from a curated list of papers across a wide range of topics, with a focus on human aspects such as Usable security, and Cybercrime. Students will also improve their academic writing and presentation skills through the reports and presentations.

Recommended Reading

This list is indicative only – the class lecturer may recommend alternative reading material. Please do not purchase any of the reading material listed below until you have confirmed with the class lecturer that it will be used for this class.

This list is indicative only – the class lecturer will recommend a mixture of specific and generic references for each part of the course and may recommend alternative reading material. Please do not purchase any of the reading material listed below until you have confirmed with the class lecturer that it will be used for this class.

  1. Anderson, R. J. (2020). Security Engineering, Wiley (third edition)
  2. Zobel, J. (2014). Writing for Computer Science, Springer

Last updated: 2024-07-17 08:27:40