Courses Scheme & Syllabus: M.E. (Software Engineering)
Courses Scheme & Syllabus: M.E. (Software Engineering)
ELECTIVE II
S.No. Code Title L T P Cr
1 PSE208 Service Oriented Architecture 3 0 2 4
2 PIS104 Cryptography 3 0 2 4
3 PCS106 Parallel And Distributed Computing 3 0 2 4
4 PIS204 Network Security & Ethical Hacking 3 0 2 4
ELECTIVE III
S.No. Code Title L T P Cr
1 PCS204 Advance Information Management System 3 0 2 4
2 PCS205 Big Data And Business Intelligence 3 0 2 4
3 PCS206 Machine Learning 3 0 2 4
4 Secure Software Development and Architecture 3 0 2 4
PSE209
Design
SEMESTER-III
S.No. Code Title L T P Cr
1 PSE391 Seminar - - - 4
2 PSE392 Capstone Project - - 10 12
Dissertation (Starts) - - - -
Total - - - 16
SEMESTER-IV
Analysis of variance: One Way Classification: ANOVA for fixed effect model, ANOVA
for Random Effect Model, Two-way Classification (one observation per cell): ANOVA for
fixed effect model, ANOVA for Random Effect Model.
Time Series and forecasting: Components of time series, Analysis of time series,
Measurement of trend, Measurement of seasonal variations, Measurement of cyclic
variations, Auto-Regression Analysis, Auto-correlation, Random component in time series.
Recommended Books
1. Medhi, J., Stochastic Processes, New Age International
2. Montgomery, Introduction to Statistical Quality Control, John Wiley and Sons
3. Populis, A., Random Variables and Stochastic Processes, Tata McGraw Hill
(2002).
4. Bhuyan K.C., Multivariate Analysis and Its Applications, New Central Book
Agency (2002).
COURSE LEARNING OUTCOMES( CLOs )
Evaluation Scheme:
Advanced Data Structures: AVL Trees, Red-Black Trees, Splay Trees, B-trees, Fibonacci
heaps, Data Structures for Disjoint Sets, Augmented Data Structures.
Algorithms Complexity and Analysis: Probabilistic Analysis, Amortized Analysis,
Competitive Analysis, Internal and External Sorting algorithms: Linear Search, Binary
Search, Bubble Sort, Selection Sort, Insertion Sort, Shell Sort, Quick Sort, Heap Sort, Merge
Sort, Counting Sort, Radix Sort.
Graphs & Algorithms: Representation, Type of Graphs, Paths and Circuits: Euler Graphs,
Hamiltonian Paths & Circuits; Cut-sets, Connectivity and Separability, Planar Graphs,
Isomorphism,Graph Coloring, Covering and Partitioning,, Depth- and breadth-first
traversals, Minimum Spanning Tree: Prim’s and Kruskal’s algorithms, Shortest-path
Algorithms: Dijkstra’s and Floyd’s algorithm, Topological sort, Max flow: Ford-Fulkerson
algorithm, max flow – min cut.
String Matching Algorithms: Suffix arrays, Suffix trees, tries, Rabin-Karp, Knuth-Morris-
Pratt, Boyer-Moore algorithm.
Recommended Books:
1. Thomas Coremen, “Introduction to Algorithms”, Prentice Hall of India (2009).
2. Kleinberg J., Tardos E., “Algorithm Design”, Pearson (2012).
3. Motwani R., Raghavan P., “Randomized Algorithms”, Cambridge University Press,
(1995).
4. Vazirani, Vijay V., “Approximation Algorithms”, Springer, (2001).
Course Learning Outcomes (CLOs)
CLO1 Implement the basic data structures, advanced data structures, Internal and External
Sorting algorithms and learn the appropriate algorithmic approach to a problem.
CLO2 Demonstrate the ability to evaluate algorithms, to provide justification for that
selection, and to implement the algorithm in a particular context
CLO3 Employ graphs to model a variety of real-world problems, synthesise tree and graph
algorithms and analyze them.
CLO4 Implement advance algorithmic techniques such as String Matching Algorithms,
Approximation algorithms etc.
Evaluation Scheme:
Software Engineering Tools and Environments: upper and lower CASE tools, evolution
of CASE tools-classification, features, strengths and weaknesses; ICASE; CASE standards.
Role of the repository for supporting incremental development, software reuse
Software Quality Assurance: SQA Tasks, Goals and Metrics, Software Review
Techniques: Informal reviews-Formal Technical Reviews, Software Reliability, Software
risk management, Case Studies. Real Time Systems
CLO1 Students should be able to identify the need for engineering approach to software
development and various processes of requirements analysis for software
engineering problems.
CLO2 Analyse various software engineering models and apply methods for design and
development of software projects.
CLO3 Work with various techniques, metrics and strategies for Testing software projects.
CLO4 Identify and apply the principles, processes and main knowledge areas for Software
Project Management
CLO5 Proficiently apply standards, CASE tools and techniques for engineering software
projects
Evaluation Scheme:
Object Modelling and Design: OMT, visual modelling, UML, Rational Rose Tool, Classes,
objects, relationships, key abstractions, common mechanisms, diagrams, class diagrams,
advanced classes, advanced relationships, interfaces, types, roles, packages, instances, object
diagrams, interactions, use cases, use case diagrams, interaction diagrams, activity diagrams,
events and signals, state machines, processes, threads, state chart diagrams, components,
deployment, collaborations, patterns and frameworks, component diagrams, systems and
models, code generation and reverse engineering.
Recommended Books
1. Object-Oriented Analysis and Design with Applications, Grady Booch (2007)
2. The Unified Modelling Language User Guide, Grady Booch, James Rumbaugh, Ivar
Jacobson, Addison-Wesley Professional (2005)
COURSE LEARNIG OUTCOMES (CLOs)
CLO1 Specify various elements of object modelling to identify, analyse, visualize, specify,
model and design
CLO2 Apply analysis and design principles at various levels and various views in different
domains of software systems.
CLO3 Represent engineering problems graphically by drawing all UML diagrams.
CLO4 Identify and apply concepts of software construction like Object Oriented
Programming skills
CLO5 Skilful use of Rational Rose tool for drawing all the UML diagrams in order to
forward and reverse engineer the complex software engineering problems.
Evaluation Scheme:
Quality Planning: Quality control, Quality assurance, Formal Technical Reviews, The SQA
Plan, ISO and CMM standards.
Risk Management: Reactive vs proactive Risk strategies, Risk projection, Risk Refinement,
Risk Monitoring, Monitoring and management, RMMM plan.
Recommended Books
1. Bob Hughes and Mike Cotterell, Software Project Management, Tata McGraw Hill
(2009)
2. Roger Pressman, A practitioner’s Guide to Software Engineering, Tata McGraw Hill
(2014 )
3. Head First PMP: A Brain Friendly Guide To Passing The Project Management
Professional Exam (2013)
Course Learning Outcomes (CLOs)
CLO1 Apply the basics of Software Project Management in order to manage and deliver
qualified product.
CLO2 Identify the Problem Effectively and Efficiently with proper documentation for the
use in different software teams and organization.
CLO3 Comprehend and be able to carry on Technical as well as Cost Benefit Analysis and
plan the activities within time schedules with CPM and PERT Analysis.
CLO4 Competent to design Communication Plans, Procurement of Resources and Human
Resource Management.
Evaluation Scheme:
Test Generation: Test generations from requirements, Test generation pats, Data flow
analysis, Finite State Machines models for flow analysis, Regular expressions based testing,
Test Selection, Minimizations and Prioritization, Regression Testing.
Program Mutation Testing: Introduction, Mutation and mutants, Mutation operators,
Equivalent mutants, Fault detection using mutants, Types of mutants, Mutation operators for
C and Java.
Laboratory Work: To Use various verification and validation testing tools and to apply
these tools on few examples and case studies
Recommended Books
1. Marcus S. Fisher, Software Verification and Validation: An Engineering and
Scientific Approach, Springer( 2007)
2. Aditya P. Mathur, Foundations of Software Testing, Pearson Education(2008)
3. Srinivasan Desikan, Gopalaswamy Ramesh, Software Testing: Principles and Practices,
Pearson Education India (2006)
CLO1 Capable to comprehend the concepts related to theoretical foundations of testing and
debugging.
CLO2 Competent to know and demonstrate software verification and validation
approaches and their applicability.
CLO3 Proficient to formulate and generate test cases from specifications
CLO4 Able to exemplify program mutation testing strategies using programming
language.
CLO5 Proficient to formulate and generate test cases from finite state machine model etc.
Evaluation Scheme:
Measuring internal product attributes: Aspects of software size, length, functionality and
complexity, measuring structure, types of structural measures, control-flow structure, and
modularity and information flow attributes, data structures.
Dynamic Metrics: Runtime Software Metrics, Extent of Class Usage, Dynamic Coupling,
Dynamic Cohesion, and Data Structure Metrics.
Software Quality: Concepts of software quality, software quality control and software
quality assurance, evolution of SQA, major SQA activities and issues, zero defect software.
Software Quality Assurance: SQA techniques; Management review process, technical review
process, walkthrough, software inspection process, configuration audits, and document
verification.
Error Reporting, Trend Analysis and Corrective Action: Identification,Analysisand
Correction of defect, implementation of correction, regression testing; Categorization of
defect w.r.t development phases; Error quantity, error frequency, program unit complexity,
compilation frequency; Corrective action and documenting the corrective action, periodic
review of actions taken.
Case Studies: CASE tools, Quality management standards, Quality standards with emphasis
on ISO approach, Capability Maturity Models-CMM and CMMI, TQM Models, Bootstrap
methodology, The SPICE project, ISO/IEC 15504, Six Sigma Concept for Software Quality.
Lab Work: To Work on small projects, build metrics and analyze, check the quality of the
projects and do a comparative study with other projects
Recommended Books
1. Practical Guide to Software Quality Management (Artech House Computing
Library)( 2003)
2. Quality Software Management, Volume 1: Systems Thinking, Dorset House
Publishing(2011)
3. Metrics and Models in Software Quality Engineering , Pearson, (2003).
4. Applied Software Measurement by Capers Jones, Tata McGraw Hill, (2008)
Evaluation Scheme:
Evaluation Scheme:
Progress Evaluation :
Every month, there will regular progress evaluation of the project based on various
parameters like problem definition, design etc.
Final Evaluation :
1.Project report
2.Presentation (may include demonstration)
3.Demonstration of the project
4. Viva (answers to the queries)
5. Reflective diary
6. Poster presentation
7. Video presentation
8. Peer review
Final Evaluation : 60 Marks
Continuous Evaluation: 40 Marks ( At least spread in two evaluations)
PSE 204 ADVANCED TOPICS IN SOFTWARE ENGINEERING
L T P Cr
3 0 2 4
Course Objectives: To apply advance topics in software engineering. To specify, abstract,
verify and validate solutions to large-size problems, to plan, develop and manage large
software using state-of-the-art methodologies and learn emerging trends
Formal Methods: Basic concepts, mathematical preliminaries, Applying mathematical
notations for formal specification, formal specification languages, using Z to represent an
example software component, the ten commandments of formal methods
Computer-Aided Software Engg: Building blocks and taxonomy for CASE, integrated
CASE environments, integration architecture, CASE repository, case Study of tools like TCS
Robot.
Real Time Operating Systems: Real-time and non-real time applications. Classification of
Real-Time Task scheduling algorithms, Event-driven scheduler- Simple priority-based, Rate
Monotonic Analysis, Earliest Deadline First, The simplest of Task assignment and
scheduling, priority scheduling, characteristics of tasks, task assignment and multi-tasking.
Laboratory Work: To implement the advance concepts in the lab using related tools and to
develop the project using related technologies
Recommended Books
1. Software Engineering a Practitioners Approach, Roger S. Pressman, McGraw-Hill,
th
8 Edition( 2014)
2. Formal Specification and Documentation using Z - A Case Study Approach,
J.Bowan, International Thomson Computer Press (2003)
3. Software Engineering for Embedded Systems: Methods, Practical Techniques, and
Applications, Robert Oshana, Mark Kraeling, Newnes Publisher (2013)
Evaluation Scheme:
Lean Approach: Waste Management, Kaizen and Kanban, add process and products add
value. Roles related to the lifecycle, differences between Agile and traditional plans,
differences between Agile plans at different lifecycle phases. Testing plan links between
testing, roles and key techniques, principles, understand as a means of assessing the initial
status of a project/ How Agile helps to build quality
Agile and Scrum Principles: Agile Manifesto, Twelve Practices of XP, Scrum Practices,
Applying Scrum. Need of scrum, working of scrum, advanced Scrum Applications, Scrum
and the Organization, scrum values
Agile Testing: Agile Testing Techniques, Test-Driven Development, User Acceptance Test
Agile Review: Agile Metrics and Measurements, The Agile approach to estimating and
project variables, Agile Measurement, Agile Control: the 7 control parameters. Agile
approach to Risk, The Agile approach to Configuration Management, The Atern
Principles,Atern Philosophy,The rationale for using Atern, Refactoring, Continuous
integration, Automated Build Tools
Scaling Agile for large projects: Scrum of Scrums, Team collaborations, Scrum, Estimate
a Scrum Project, Track Scrum Projects, Communication in Scrum Projects, Best Practices to
Manage Scrum.
Laboratory Work: Exploring the tools related to Agile Development and approached and
develop small projects using this technology
Recommended Books
1. Robert C. Martin ,Agile Software Development, Principles, Patterns, and Practices
Alan Apt Series (2011)
2. Succeeding with Agile : Software Development Using Scrum, Pearson (2010)
CLO1 Analyze existing problems with the team, development process and wider
organization
CLO2 Apply a thorough understanding of Agile principles and specific practices
CLO3 Select the most appropriate way to improve results for a specific circumstance or
need
CLO4 Judge and craft appropriate adaptations to existing practices or processes depending
upon analysis of typical problems
CLO5 Evaluate likely successes and formulate plans to manage likely risks or problems
Evaluation Scheme:
Legal and Regulatory: CBSE as a Unique Engineering Discipline, The Future of Software
Components: Standards and Certification, Commercial Law Applicable to Component-
Based Software, The Effects of UCITA on Software Component Development and
Marketing, Future of CBSE.
CLO1 Familiarization with Component Based Systems, their Purpose and Scope.
CLO2 AnalyseSoftware Engineering Practices related to CBD.
CLO3 Apply design Of Software Component Infrastructures
CLO4 IdentifyComponent Based Development Technologies
CLO5 Relate the concept of Legal and regulatory framework related to CBD
Evaluation Scheme:
Meaning: Lexical Knowledge Networks, WorldNet Theory; Indian Language Word Nets
and Multilingual Dictionaries; Semantic Roles; Word Sense Disambiguation; WSD and
Multilinguality; Metaphors.
Speech Recognition: Signal processing and analysis method, Articulation and acoustics,
Phonology and phonetic transcription, Word Boundary Detection; Argmax based
computations; HMM and Speech Recognition.
CLO1 Comprehend the concept of Natural Language Processing (NLP), its challenges
and applications.
CLO2 Process words and word forms of the language by considering its morphology,
paradigms and named entities.
CLO3 Demonstrate and implement the use of machine translation by using rule-based MT,
Knowledge Based MT and Statistical Machine Translation etc.
CLO4 Comprehend the concepts of WorldNet, Semantic Roles and Word Sense
Disambiguation
CLO5 Demonstrate the use of NLP in speech recognition and other emerging applications
like Sentiment Analysis, Information Retrieval etc.
Evaluation Scheme:
Service Oriented Architecture: Major components of the architecture SOAP, XML, HTTP,
Cookies, WSDL, XML schema, UDDI, Interactions between components.
SOA platform basics: SOA support in J2EE, Java API for XML-based web services
(JAX-WS), Java architecture for XML binding (JAXB), Java API for XML Registries
(JAXR), Java API for XML based RPC (JAX-RPC), Web Services Interoperability
Technologies (WSIT), SOA support in .NET, Common Language Runtime, ASP.NET
web forms, ASP.NET web services, Web Services Enhancements (WSE)
Laboratory work: Installing and configuring web servers, building and implementing Web
services using the latest tools (.NET, J2EE).
Recommended Books
1. Rick Sweeney, Achieving Service-Oriented Architecture: Applying an Enterprise
Architecture Approach, (2010)
2. Thomas Erl, Service-Oriented Architecture: Concepts, Technology, and Design, Pearson
Education, (2005)
Course Learning Outcomes (CLOs)
CLO1 Analyze functions of Service Oriented Architecture and identify the ways in which
they can benefit organizations and study the comparison of web services with other
technologies.
CLO2 Evaluate the design of SOA, Major components of the architecture SOAP, XML,
HTTP, Cookies, WSDL, XML schema, UDDI and Interactions between various
components.
CLO3 Learn some of Semantic Web technologies and applications with knowledge of
XML’s, Grammar rules, namespace schema.
CLO4 Create web services and web services clients with state-of-the-art tools along
CLO5 Exemplify the web service interoperability, security, and future of web services with
the implementation of cloud computing
Evaluation Scheme:
Block Ciphers: Feistel Networks, Data Encryption Standard (DES): Design and Security,
Advanced Encryption Standard: Design and Security, One Way Functions, Construction of
Pseudorandom Generators, Construction of Pseudorandom Functions, Construction of
Pseudorandom Permutations
Public Key Cryptography: Basic Group Theory, Primes, Factoring, Cyclic Groups,
Discrete Logarithms, Cryptography Using Arithmetic Modulo Primes, Arithmetic Modulo
Composites, RSA Public Key Encryption, Security Against Active Attacks, Attacks on RSA,
El Gamal Encryption Schemes, Recent Public Key Encryption Schemes
Digital Signatures: Definitions and Applications, Lamport and Merkle Schemes. Overview
of Signatures Based on Discrete-Log Certificates and Trust Management., SSL/TLS and
Ipsec, Privacy Mechanisms
CLO1 Compare and contrast a range of different cryptosystems from an applied viewpoint.
CLO2 Identify the different approaches to quantifying secrecy
CLO3 Recognize the different modes of operation for block ciphers and their applications
and understand the role of hash functions in information security.
CLO4 Account for the cryptographic theories, principles and techniques that are used to
establish security properties
CLO5 Analyze and use methods for cryptography and reflect about limits and applicability
of methods
Evaluation Scheme:
Laboratory Work : To Implement the algorithms with the help of CUDA programming
using parallel and distributed programming techniques
Recommended Books:
1. A Grama, A Gupra, G Karypis, V Kumar. Introduction to Parallel Computing (2nd
Ed.). Addison Wesley(2003).
2. C Lin, L Snyder. Principles of Parallel Programming. USA: Addison-Wesley
Publishing Company(2008).
3. J Jeffers, J Reinders. Intel Xeon Phi Coprocessor High-Performance Programming.
Morgan Kaufmann Publishing and Elsevier(2013).
4. T Mattson, B Sanders, B Massingill. Patterns for Parallel Programming. Addison-
Wesley Professional(2004).
Course Learning Outcomes (CLOs)
CLO1 Learn the concepts, issues and tasks in parallel and distributed computing along with
different parallel architectures
CLO2 Demonstrate the principles for Parallel Algorithm Design.
CLO3 Explore the parallel programming models and algorithms for common operations.
CLO4 Analyze the application of parallel algorithms to solve the complex computational
problems.
CLO5 Implement various parallel algorithms with CUDA.
Evaluation Scheme:
Scanning: Scanning, Elaboration phase, active scanning, scanning tools NMAP, hping2.
Enumeration, DNS Zone transfer. Detecting live systems on the network, Discovering
services running /listening on target systems, Understandingport scanning techniques,
Identifying TCP and UDP services running on the network, Active and passive
fingerprinting
Trojans and Backdoors: Effect on Business, Trojan, Overt and Covert Channels, Working
of Trojans, Different Types of Trojans, Different ways a Trojan can get into a system,
Indications of a Trojan Attack, Some famous Trojans and ports used by them
Sniffers: Definition of sniffing, Sniffer working, Passive Sniffing, Active Sniffing, Ethreal
tool, Man-in-the-Middle Attacks, Spoofing and Sniffing Attacks, ARP Poisoning and
countermeasures. Denial of Service:Goal of DoS (Denial of Service), Impact and Modes of
Attack.
Ethical Hacking: System Hacking and Hacking Wireless Networks: Aspect of remote
password guessing, Role of eavesdropping, Various methods of password cracking,
Keystroke Loggers, Understanding Sniffers, Comprehending Active and Passive Sniffing,
ARP Spoofing and Redirection, DNS and IP Sniffing, HTTPS Sniffing. Introduction to
802.11, Role of WEP, Cracking WEP Keys, Sniffing Traffic, Wireless DOS attacks, WLAN
Scanners, WLAN Sniffers, Hacking Tools, Securing Wireless Networks.
Laboratory work: deals with launching different types of attacks and creating a network
blueprint of an organization.
Recommended Books
1. Eric Core, Hackers Beware, EC-Council Press, (2003)
2. William Stallings, Network Security Essentials, Prentice Hall, ( 2013)
3. William R. Cheswick and Steven M. Bellovin, Firewalls and Internet Security, Addison-
Wesley Professional, ( 2003.)
4. W. Stallings, Cryptography and Network Security, Prentice Hall (2010)
Evaluation Scheme:
Need of NoSQL and Its Data Models: Key- value data model, Document data model,
Column family data model, Graph data models, CAP Theorem
Data Warehousing Concepts, OLAP and Data mining: Evolution of data warehousing,
data warehousing concepts, benefits and problems of data warehousing, comparison of
OLTP systems and data warehousing, On-Line Analytical Processing, Introduction to data
mining.
Recommended Books:
1. Thomas Connolly, Carolyn Begg, “Database Systems”, Pearson Education, (2005)
2. Pramod J Sadalage and Martin Fowler, “NoSQL Distilled”, Pearson, (2012)
3. Hoffer, Prescott, Mcfadden, “Modern Database Management”, Pearson Education Asia,
(2007)
4. Ivan Bayross, “SQL and PL/SQL”, BPB Publication, ( 2010)
Course Learning Outcomes (CLOs)
Evaluation Scheme:
Big Data Technology Landscape: Fundamentals of Big Data Types, Big data Technology
Components, Big Data Architecture, Big Data Warehouses, Functional vs. Procedural
Programming Models for Big Data.
Business implementation of Big Data: Big Data Implementation, Big Data workflow,
Operational Databases, Graph Databases in a Big Data Environment, Real-Time Data
Streams and Complex Event Processing, Applying Big Data in a business scenario, Security
and Governance for Big Data, Big Data on Cloud, Best practices in Big Data implementation,
Latest trends in Big Data, Latest trends in Big Data, Big Data Computation, More on Big
Data Storage, Big Data Computational Limitations.
Laboratory Work: Introduction, use and assessment of most recent advancements in Big
Data technology along with their usage and implementation with relevant tools and
technologies.
Recommended books:
1. Minelli M., Chambers M., Dhiraj A., Big Data, Big Analytics: Emerging Business
2. Intelligence and Analytic Trends for Today's Businesses, Wiley CIO Series (2013),
3. White T., Hadoop: The Definitive Guide, O’ Reilly Media (2012).
Course Learning Outcomes (CLOs)
CLO1 Comprehend the concepts of big data, architecture and environment, digital data
types, structure and its implementation.
CLO2 Explore the advanced level of understanding of the usage of Big Data in present
World.
CLO3 Comprehend the concepts of Map-Reduce, HDFS command and Hadoop services
and its implementation.
CLO4 Analyze big data, create statistical models, and identify insights that can lead to
actionable results
CLO5 Use software tools such as R and Hadoop, in text analytics.
Evaluation Scheme:
Decision Tree Learning: Decision tree representation, appropriate problems for decision
tree learning, Univariate Trees (Classification and Regression), Multivariate Trees, Basic
Decision Tree Learning algorithms, Hypothesis space search in decision tree learning,
Inductive bias in decision tree learning, Issues in decision tree learning.
Bayesian Learning: Bayes theorem and concept learning, Bayes optimal classifier, Gibbs
algorithms, Naive Bayes Classifier, Bayesian belief networks, The EM algorithm.
Design and Analysis of Machine Learning Experiments: Guidelines for machine learning
experiments,Factors, Response, and Strategy of experimentation, Cross-Validation and
Resampling methods, measuring classifier performance, Hypothesis testing, Assessing a
classification algorithm's performance, Comparing two classification algorithms, Comparing
multiple algorithms: Analysis of variance, Comparison over multiple datasets.
Laboratory Work: It is concerned with the design, analysis, implementation, and
applications of programs that learn from experience. Learning algorithms can also be used
to model aspects of human and animal learning.
Recommended Books
1. Mitchell T.M., Machine Learning, McGraw Hill (1997).
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2010).
3. Bishop C., Pattern Recognition and Machine Learning, Springer-Verlag (2006).
4. Michie D., Spiegelhalter D. J., Taylor C. C., Machine Learning, Neural and Statistical
Classification. Overseas Press (2009).
Evaluation Scheme:
Secure Architectural Design: Threat Modelling, Asset, Threat, Attack, Dataflow Diagram
(DFD), Threat Tree (Attack Tree), STRIDE, DREAD. Security Architecture, Software
Attack Surface, Secure, Mandatory Access Control (MAC), Discretionary Access Control
(DAC), Role-based Access Control (RBAC), Access Matrix
Code & Resource Protection: Introduction to Back Door, Time Bomb, Four-Eyes
Principle, Confidentiality Classification, Background Screening, Security Clearance, Offline
and Online Licensing, Mechanisms, Code Obfuscation
Recommended Books
1. Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw and Nancy Mead Software
Security Engineering: A Guide for Project Managers by. Addison-Wesley, (2004)
2. Gary McGraw ,Software Security: Building Security, Addison-Wesley (2006)
3. Threat Modelling: Designing for Security by Adam Shostack, John Wiley and Sons Inc,
(2014).
4. Mano Paul ,7 Qualities of Highly secure Software Taylor and Francis, CRC Press (2012)
Course Learning Outcomes (CLOs)
CLO1 Analyze issues related secure software development methodologies
CLO2 Apply a thorough understanding of secure coding principles
CLO3 Select the most appropriate approach to secure software development
CLO4 Judge and craft appropriate adaptations to the development process to make sure a
secure deployment
CLO5 Evaluate the implications and impact of secure architecture design
Evaluation Scheme:
Evaluation Scheme:
Evaluation Scheme:
Progress Evaluation :
Every month, there will regular progress evaluation of the project based on various
parameters like problem definition, design etc.
Final Evaluation :
1.Project report
2.Presentation (may include demonstration)
3.Demonstration of the project
4. Viva (answers to the queries)
5. Reflective diary
6. Poster presentation
7. Video presentation
8. Peer review
Evaluation Scheme: