MTechSyllabus CSE Booklet
MTechSyllabus CSE Booklet
MASTER OF TECHNOLOGY
IN
IIITUPGCSE22
2022-2024
SCHOOL OF COMPUTING
IIITUPGCSE22
SCHOOL OF COMPUTING
INDIAN INSTITUTE OF INFORMATION TECHNOLOGY UNA
SALOH, UNA (HIMACHAL PRADESH)
Personal Details
Name:
Batch:
Roll Number:
Residential Address:
Mobile Number:
Email ID:
Twitter ID:
Skype ID:
Blood Group:
Height:
Weight:
Vehicle No.:
Mission
M1: To provide quality education to the students with practical orientation.
M2: To collaborate with industries and research institutions to solve socially relevant
problems.
M3: To inspire students to become responsible citizens and competent professionals
with ethical values.
Mission
M1: To impart state-of-the-art knowledge in computer science and information
technology with emphasis on practical knowledge and to promote specialization in
emerging streams.
M2: To participate in research and development in industries and research
organizations.
M3: To make the students aware of ethics and apply them in solving social problems.
2
4. M.Tech. CSE (PEOs and PSOs)
4.1 Program Educational Objectives (PEOs)
PEO1: Career
To ensure that the post-graduates will work in renowned industries / research
organizations, pursue advanced degrees, or become entrepreneurs.
PEO2: Professionalism
To ensure that the post graduates demonstrate their ability to solve complex and
socially relevant problems in multidisciplinary contexts, and will apply professional
ethics.
M1 M2 M3
PEO1 3 3 1
PEO2 3 2 3
PEO3 2 2 3
2
4.4 PO/ PSO to PEO Mapping
PO3: Design/Development of 3 2 3
solutions
PO4: Conduct investigations of 3 1 3
complex problems
PO5: Modern tool usage 3 2 3
PO10: Communication 2 3 3
PSO1 3 2 3
PSO2 2 3 2
PSO3 1 2 3
2
5. Design of Curriculum
The M.Tech. Course Curriculum has been designed conforming to the recommendations of
Senate and guidelines of AICTE, including the NEP 2020.
Curriculum consists of the following components of study:
I. Multiple Entry Multiple Exit Option (MEME):
This program has been designed with MEME option as per the guidelines of NEP 2020.
First Entry: Admission to 2-year program.
First Exit: Optionally at the end of one year with Post Graduate Diploma in Data
Science/Cyber Security.
Normal Exit: At the end of second year with M.Tech. in CSE with specialization in
Data Science/ Cyber Security.
Reentry: In Second year of the M.Tech. program with a minimum gap of one year or
integral multiple of years.
Only one reentry permitted for a student.
II. Program Core (PC)
The PC consist of 2 theory courses both comprising labs. All the PC subjects will be covered
in first year.
III. Program Elective (PE)
A total number of three program electives each in first and second semester will be offered.
Student will have to choose any one subject as per their choice in each of the program electives.
IV. Project Work (PW)
The project work is designed for a total duration of two semesters (III and IV) as a single project
involving detailed literature survey, experimentation plan, and implementation. The
percentage of overall project should be 60% in III Semester and 40% in IV Semester.
2
grades: (a) Normalized curve, (b) Z-score, and (c) Gap analysis.
VIII. Highlights of Curriculum
The students will study the curriculum with the following features:
More Practical Oriented Teaching and Learning.
More hands-on Projects.
Stream Oriented Specialization.
Multi-Disciplinary Electives/ Research Projects.
Relative Grading.
Overall Personality Development.
Employable Post Graduates for Industries.
Excellent Placements.
Conformance to NEP 2020.
IX. Insights of Curriculum
The students will study the curriculum with the following features:
One core course in I and II Semesters.
Three program electives in I and II Semesters.
One Online Course in I and II Semesters.
Practicals are integrated into theory.
One Mini project/Term Paper in I and II Semesters.
Two semesters Project Phase-I and Phase-II in III and IV Semester.
Industry internship is also permitted in lieu of Project Phase-I and Phase II.
Total number of credits (28+28+12+12) =80.
X. Curriculum Components
2
5 A. Semester-wise Program Electives
(Specialization in Data Science)
Program Elective I (Semester I)
S.No. Code Course Name
1 PDSE101 Mathematical Foundation for Data Science
2 PDSE102 Data Engineering
2
5 B. Semester-wise Program Electives
(Specialization in Cyber Security)
2
5 C. Semester-wise Curriculum
(Specialization in Data Science)
Semester I
S.No. Code Course Name L T P C
1 PCSC100 Advanced Data Structures and Algorithms 3 0 4 5
2 PDSE1XX Program Elective I 3 1 0 4
3 PDSE1XX Program Elective II 3 0 4 5
4 PDSE1XX Program Elective III 3 0 4 5
5 PDSO100 Online Course I* 5 1 0 3
6 PCSP100 Mini Project-I 0 0 12 6
Total 17 2 24 28
Total Hours 42
Semester II
S.No. Code Course Name L T P C
1 PCSC200 Advanced Database Systems 3 0 4 5
2 PDSE2XX Program Elective IV 3 1 0 4
3 PDSE2XX Program Elective V 3 0 4 5
4 PDSE2XX Program Elective VI 3 0 4 5
5 PDSO200 Online Course II* 5 1 0 3
6 PCSP200 Mini Project-II 0 0 12 6
Total 17 2 24 28
Total Hours 42
*NPTEL/SWAYAM/MOOCS/etc.
Semester III
S.No. Code Course Name L T P C
1 PCSP300 Project Work- Phase I 0 0 36 12
Total 0 0 36 12
Total Hours 36
Semester IV
S.No. Code Course Name L T P C
1 PCSP400 Project Work- Phase II 0 0 36 12
Total 0 0 36 12
Total Hours 36
Summary
Semester I II III IV Total
Credits 28 28 12 12 80
2
5 D. Semester-wise Curriculum
(Specialization in Cyber Security)
Semester I
S.No. Code Course Name L T P C
1 PCSC100 Advanced Data Structures and 3 0 4 5
Algorithms
2 PCBE1XX Program Elective I 3 1 0 4
3 PCBE1XX Program Elective II 3 0 4 5
4 PCBE1XX Program Elective III 3 0 4 5
5 PCBO100 Online Course I* 5 1 0 3
6 PCSP100 Mini Project-I 0 0 12 6
Total 17 2 24 28
Total Hours 42
Semester II
S.No. Code Course Name L T P C
1 PCSC200 Advanced Database Systems 3 0 4 5
2 PCBE2XX Program Elective IV 3 1 0 4
3 PCBE2XX Program Elective V 3 0 4 5
4 PCBE2XX Program Elective VI 3 0 4 5
5 PCBO200 Online Course II* 5 1 0 3
6 PCSP200 Mini Project-II 0 0 12 6
Total 17 2 24 28
Total Hours 42
*NPTEL/SWAYAM/MOOCS/etc.
Semester III
S.No. Code Course Name L T P C
1 PCSP300 Project Work- Phase I 0 0 36 12
Total 0 0 36 12
Total Hours 36
Semester IV
S.No. Code Course Name L T P C
1 PCSP400 Project Work- Phase II 0 0 36 12
Total 0 0 36 12
Total Hours 36
Summary
Semester I II III IV Total
Credits 28 28 12 12 80
2
5 E. STUDY CHART (Specialization in Data Science)
PC I PC II
PE II PE V
Data Driven Applied Data
Modeling and Science
Optimization
PE III PE VI
Machine Learning Introduction to Block
Chain
2
5 F. STUDY CHART (Specialization in Cyber Security)
PC I PC II
PE II PE V
Principles of Malware Analysis
Cryptography and Detection
PE III PE VI
ML for Security Block Chain
using R Technology
2
6. SYLLABUS
2
6.1 PROGRAM CORE (PC)
6.1.1 Program Core I (Semester I)
Course Code PCSC100
Course Title Advanced Data Structures and Algorithms
Number of Credits 3-0-4-5
Course Type PC
Course Objectives:
To analyze the asymptotic performance of algorithms.
To demonstrate a familiarity with major algorithms and data structures.
To apply important algorithmic design paradigms and methods of
analysis.
To synthesize efficient algorithms in common engineering design
applications.
Course Contents
Unit-I Introduction 8
Fundamental data structures: linked lists and arrays. Efficiency analysis and
Asymptotic analysis. Complexity of algorithms and Algorithmic paradigms. Arrays
and Recursion functions, Stacks and Queues, Heaps as priority queues, heap
implementation, insertion and deletion operations, binary heaps, binomial and
Fibonacci heaps, heapsort, heaps in Huffman coding.
2
Total: 40 periods
Text Books
1. Skiena, S. S. (2008). “The Algorithm Design Manual”. Springer Publishing
Company.
2. Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C.
(2022). “Introduction to Algorithms”. MIT press.
Reference Books
1. Dasgupta, S., Papadimitriou, C. H., and Vazirani, U. V. (2008). “Algorithms”.
New York: McGraw-Hill Higher Education.
2. Kruse, R., and Tondo, C. L. (2007). “Data structures and program design in
C”. Pearson Education India.
Course Outcomes:
CO to PO/PSO Mapping
2
6.1.2 Program Core II (Semester II)
Course Code PCSC200
Course Title Advanced Database Systems
Number of Credits 3-0-4-5
Course Type PC
Course Objectives:
To lay a strong foundation into the basic principles using relational databases.
To demonstrate a familiarity with major query optimization algorithms.
To apply important database design paradigms for solving problem.
To apply emerging database technologies in various domains.
Course Contents
Unit-I Introduction 8
DBMS, Requirement and Applications, Data models (ER, relational models,
constraints, normalization), declarative querying (relational algebra, datalog, SQL),
query processing/optimization (basics of indexes, logical/physical query plans, views)
and transaction management (introduction to concurrency control and recovery).
2
Unit-V Emerging Systems 8
Enhanced Data Models, Client/Server Model, Web Databases, Mobile Databases,
XML and Web Databases, MongoDB, No SQL. Distributed data management
(including distributed data storage, query processing and transaction management),
web-data management (including managing the web-graph and implementation of
web-search), big data systems, Databases in cloud, Multimedia database, Spatial
databases, Augmented Data Management (ADM), Graph database, Adopting
MDDBMS (Multi-Database), In-memory Database (IMDB), DBMS and AI/ML.
Total: 40 periods
Text Books
1. Elmasri, R., Navathe, S. B. (2016). “Fundamentals of Database Systems”, The
Benj amin. Cummings, Redwood City, California.
2. Dabir, H. and Meher, D. (2014), “Advanced RDBMS Using Oracle”, Vision
Publications.
3. Zaniolo, C., Ceri, S., Faloutsos, C., Snodgrass, R. T., Subrahmanian, V. S.,
Zicari, R. (1997). “Advanced database systems”. Morgan Kaufmann.
Reference Books
1. Diaz, O., Piattini, M. (2000). “Advanced database technology and design”.
Artech.
2. Martin, D. (1986). “Advanced database techniques”. MIT Press.
Course Outcomes:
CO1 Understand and analyze the basic query optimization algorithms. K3
CO2 Illustrate the database concurrency control and recovery K3
concepts.
CO3 Explain the various distributed databases. K4
CO4 Explain database security and advanced management techniques. K3
CO5 Demonstrate a familiarity with database applications in various K3
fields such as mobile computing, business intelligence, cloud
computing, etc.
CO to PO/PSO Mapping
2
6.2 Program Electives (PE)
(Specialization in Data Science)
2
6.2.1 Program Elective I (Semester I)
Course Code PDSE101
Course Title Mathematical Foundations for Data Science
Number of Credits 3-1-0-4
Course Type PE
Course Objectives:
To understand the basics of probability theory.
To learn the fundamentals of optimization techniques.
To study and apply statistical concepts.
To understand and formulate problems of data science using linear algebra.
Course Contents
Unit-I Fundamentals 8
Probability Theory, Conditional probability, Bayes’ Theorem and independence,
Random Variables, Probability Distributions (Bernoulli, Binomial, Multinomial,
Uniform and Gaussian), Mathematical Expectation, Moments, Covariance, Correlation
Coefficient, Prior and Posterior.
Unit-IV Calculus 8
Differential and Integral Calculus, Partial Derivatives, Vector-Values Functions,
Directional Gradient, Hessian, Jacobian, Laplacian and Lagragian Distribution.
Unit-V Optimization 8
Optimization: Unconstrained optimization; Necessary and sufficiency, Conditions for
optima, Gradient descent method, Constrained optimization using Lagrange method
and KKT conditions, Introduction to non-gradient techniques, optimization using least-
squares method, Optimization view of machine learning.
Total Periods: 40
IIITUPGCSE22 School of Computing 21
2
Text Books
1. Strang, G., Strang, G., Strang, G., Strang, G. (1993). “Introduction to linear
algebra”. Wellesley, MA: Wellesley-Cambridge Press.
2. Walpole, R. E., Myers, R. H., Myers, S. L.,Ye, K. (1993). “Probability and
statistics for engineers and scientists”. (Vol. 5). New York: Macmillan.
3. Luenberger, David G. (1997). “Optimization by vector space methods”. John
Wiley and Sons.
Reference Book
1. Hoffman, K., and Ray K. (1971). "Linear algebra”. Englewood Cliffs, New
Jersey.
2. Greub, W. H. (2012). “Linear algebra” (Vol. 23). Springer Science and
Business Media.
Course Outcomes:
CO to PO/PSO Mapping
2
6.2.2 Program Elective I (Semester I)
Course Code PDSE102
Course Title Data Engineering
Number of Credits 3-1-0-4
Course Type PE
Course Objectives:
To understand the fundamentals of data engineering concepts.
To study how to perform various operations over the text data.
To examine how to store and access the data from the databases.
To inspect how to extract the matching string from the texts.
To visualize the data using plotting tools.
Unit-I: Introduction 8
Data Science: Data Analysis Sequence, Data acquisition Pipeline, Report structure.
Files and working with Text Data: Types of Files, Creating and Reading Text Data,
File Methods to Read and Write Data, Reading and Writing Binary Files, Pickle
Module, Reading and Writing CSV Files, Python and Path Modules. Working with
Text Data: JSON and XML in Python.
2
Unit-V Data Series and Frames 8
Introduction: Pandas Data Structures, Reshaping Data, Handling Missing Data,
Combining Data, Ordering and Describing Data, Transforming Data, Taming Pandas
File I/O. Plotting: Basic Plotting with PyPlot, Getting to know Other plot types,
Mastering Embellishments, Plotting with Pandas.
Total Periods: 40
Text Books
1. Zinoviev, D. (2016). “Data Science Essentials in Python: Collect-Organize-
Explore-Predict-Value”. Pragmatic Bookshelf.
2. Gowrishankar, S.,Veena, A. (2018). “Introduction to Python Programming”.
CRC Press.
Reference Books
1. Severance, C. R., Blumenberg, S., Hauser, E. (2016). “Python for everybody:
exploring data in python”. North Charleston: CreateSpace Independent Publishing
Platform.
2. Albon, C. (2018). “Machine learning with python cookbook: Practical solutions
from preprocessing to deep learning”. O'Reilly Media.
3. Nelli, F. (2015). “Python data analytics: Data analysis and science using
PANDAs, Matplotlib and the Python Programming Language”. Apress.
Course Outcomes:
CO1 Explain different types of files and text data. K2
CO2 Apply regular expression operations for data validation. K4
CO3 Create and test relational databases via SQL. K3
CO4 Apply and experiment with the searching and query’s efficiency. K6
CO5 Visualize the data using PyPlot. K1
CO to PO/PSO Mapping
2
6.2.3 Program Elective II (Semester I)
Course Code PDSE103
Course Title Data Driven Modelling and Optimization
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To study the basic data-driven modelling concepts.
To identify certain complex engineering analysis problems.
To apply the extracted knowledge to build ontologies.
To estimate feasible solution given a set of static constraints.
To formulate the global optimal solutions based on genetic algorithms.
Course Contents
Unit-I: Data-Driven Modelling Concepts 8
Mathematical Linear algebra, Calculus, Probability, Programming: Python,
data exploration foundation, and Computational Thinking.
Total Periods: 40
Text Books
1. Dantzig, G. B., Thapa, M. N. (2003). “Linear programming: Theory and
extensions”. New York: Springer.
2. Shah, C. (2020). “A hands-on introduction to data science”. Cambridge
University Press.
2
Reference Books
1. Balaji, C. (2011). “Essentials of thermal system design and
optimization”. Ane Books Pvt.
2. Choudhury, A. A. S., Shah, S. L., Thornhill, N. F. (2008). “Diagnosis of
process nonlinearities and valve stiction: data driven approaches”.
Berlin: Springer.
Course Outcomes:
CO to PO/PSO Mapping
2
6.2.4 Program Elective II (Semester I)
Course Objectives:
To study the basics of artificial intelligence.
To automate the decision pipelines to predict the features.
To represent the knowledge using probability to indicate the uncertainty.
To study how to control the physical things in an intelligent way.
Course Contents
Unit-I: Basic Concepts 8
Foundations of AI, Intelligent Agents, acting under uncertainty, quantifying
uncertainty, basic probability notation, Inference using full joint distribution, Making
Simple Decisions, Utility theory, utility functions, decision networks, sequential
decision problems, Partially, Observable MDPs, Game Theory.
Total Periods: 40
2
Text Book
1. Russel, S., Norvig, P. (2015), “Artificial Intelligence: A Modern Approach”,
Third edition, Prentice Hall.
Reference Books
1. Yang, Q. (1997), “Intelligent Planning: A decomposition and abstraction-
based approach”, Springer Verlag, Berlin Heidelberg.
2. Bostrom, N. (2020). “Machine Ethics and Robot Ethics”, Springer.
Course Outcomes:
CO1 Construct probabilistic reasoning to handle uncertain situations. K3
CO2 Examine the logic behind the knowledge in learning. K4
CO3 Interpret the knowledge and relationship using semantic K2
networks.
CO4 Apply reinforcement learning algorithms to solve relevant K4
problems.
CO5 Explore novel AI techniques based on emerging real-world K3
requirements.
CO to PO/PSO Mapping
2
6.2.5 Program Elective III (Semester I)
Course Code PDSE105
Course Title Machine Learning
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To introduce the major concepts of Machine Learning.
To acquire advanced data analysis skills.
To create Machine Learning-based solutions for real-world problems.
To provide hands-on experience of R/Python programming based Machine
Learning.
Course Contents
Unit I: Introduction to Machine Learning 8
Origin of Machine Learning, Uses and Abuses of Machine Learning, Types of Machine
Learning Algorithms, how do machines learn? Steps to apply Machine Leaning to data,
choosing a Machine Learning Algorithm, Review of Linear Algebra, Probability and
Statistics, exploring and understanding data.
Total Periods:40
IIITUPGCSE22 School of Computing 29
2
Text Books
1. Michalski, R. S., Carbonell, J. G., and Mitchell, T. M. (Eds.). (2013). “Machine
learning: An artificial intelligence approach”. Springer Science and Business
Media.
2. Hearty, J. (2016). “Advanced Machine Learning with Python: Solve data science
problems by mastering cutting-edge machine learning techniques in Python”.
Packt Publishing Limited.
Reference Books
1. Burger, S. V. (2018). “Introduction to machine learning with R: Rigorous
mathematical analysis.” O'Reilly Media.
2. Han, J., Kamber, M. and Pei J. (2012). “Data Mining Concepts and Techniques”,
Third Edition, Morgan Kaufmann Publishers.
Course Outcomes
CO to PO/PSO Mapping
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO/PO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 2 2 3 1 1 - - 3 - - - - 1 2 2
CO2 2 3 3 3 1 - - - - - - 3 3 2 2
CO3 2 3 3 3 1 - - - - - - 3 3 2 2
CO4 2 3 3 3 1 - - - - - - 3 3 2 2
CO5 3 3 3 3 1 - - 3 - - - 3 3 3 3
Score 11 14 15 13 5 - - 3 - - - 12 13 11 11
Course
2 3 3 1 1 - - 3 - - - 3 3 2 2
Mapping
2
6.2.6 Program Elective III (Semester I)
Course Contents
Unit I: Introduction 8
Data Storage and Analysis, Characteristics of Big Data, Big Data Analytics, Typical
Analytical Architecture, Challenges in Big Data Analytics, Need of big data
frameworks. Unstructured Data Analytics, Technologies and tools.
2
Text Books
1. White, T. (2015). “Hadoop: The Definitive Guide” O’Reilly.
2. Mohri, M., Rostamizadeh, A. and Talwalker, A. (2018). “Foundations of
Machine Learning”, Second Edition, MIT Press.
3. Karau, H., Konwinski, A., Wendell, P., Zaharia, M. (2015).
“Learning spark: lightning-fast big data analysis. " O'Reilly Media, Inc.".
Reference Books
1. Pentreath, N. (2015). “Machine Learning with Spark”, Packt
Publishing.
2. Miner, D. (2012). Adam Shook, “Map Reduce Design Pattern”,
O’Reilly.
Course Outcomes
CO1 Understand Big data challenges and need of Big data storage and K2
computation tools.
CO2 Apply Hadoop, HBase , MapReduce, Spark to solve big data K3
problems
CO3 Analyze big data using Pig, Hive, Spark tools for solving real world K4
problems
CO4 Assess and apply Hadoop and Spark tools for big data analytics K4
CO5 Analyse different big data tools for real-word scenarios. K6
CO to PO/PSO Mapping
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO/PO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 1 1 1 - - - - - - - - 1 1 - 1
CO2 3 3 3 3 3 1 - - 1 - 1 1 2 2 3
CO3 3 3 3 3 3 1 - - 1 - 1 1 2 2 3
CO4 3 3 3 3 3 1 - 1 - 1 1 2 2 3
CO5 2 2 - - - - - - - - - - - - -
Score 10 10 10 9 9 3 - - 3 3 3 4 7 6 10
Course
2 3 3 3 1 - - 3 - - - 3 3 2 2
Mapping
2
Course Code PDSE201
Course Title Business Intelligence
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To be exposed to the basic rudiments of a Business Intelligence System.
To understand the modeling aspects behind Business Intelligence.
To understand the business intelligence life cycle and the techniques used in it.
To be exposed with different data analysis tools and techniques.
Course Contents
Unit I: Business Intelligence 8
Effective and timely decisions, Data, information and knowledge, Role of
mathematical models, Business intelligence architectures: Cycle of a business
intelligence analysis, Enabling factors in business intelligence projects, Development
of a business intelligence system, Ethics and business intelligence, BI Tools.
Total Periods:40
2
Text Books
1. Efraim T., Ramesh S., Dursun D. (2013), “Decision Support and Business
Intelligence Systems”, 9th ed., Pearson.
2. Williams S. (2014). “Business Intelligence Strategy and Big Data Analytics: A
General Management Perspective”, 1st ed, Elsevier.
3. Sharda R., Delen D., Turban E. (2015), “Business Intelligence and Analytics:
Systems for Decision Support”, Pearson.
Reference Books
1. Larissa T. Moss, S. (2003), “Business Intelligence Roadmap: The Complete
Project Lifecycle of Decision Making”, Addison Wesley.
2. Carlo V. (2009). “Business Intelligence: Data Mining and Optimization for
Decision Making”, Wiley Publications.
Course Outcomes:
CO1 Explain the fundamentals of business intelligence. K2
CO2 Link data mining with business intelligence. K3
CO3 Apply various modeling techniques. K4
CO4 Explain the data analysis and knowledge delivery stages. K2
CO5 Apply business intelligence methods to various situations and K4
identify an appropriate technique.
CO to PO/PSO Mapping
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO/PO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 2 2 3 1 1 - - 3 - - - - 1 2 2
CO2 2 3 3 3 1 - - - - - - 3 3 2 2
CO3 2 3 3 3 1 - - - - - - 3 3 2 2
CO4 2 3 3 3 1 - - - - - - 3 3 2 2
CO5 3 3 3 3 1 - - 3 - - - 3 3 3 3
Score 11 14 15 13 5 - - 3 - - - 12 13 11 11
Course
2 3 3 3 1 - - 3 - - - 3 3 2 2
Mapping
2
6.2.8 Program Elective IV (Semester II)
Course Code PDSE202
Course Title Quantum Machine Learning
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To introduce the basic concepts of quantum computing.
To understand the contribution of quantum computing in data mining domain.
To study quantum mechanics, clustering, and classification.
To explore tools and best practices for quantum machine learning.
Course Contents
Unit I: Introduction 8
Introduction to Quantum computing, advantages, history and applications, basics of
quantum computing, Global Perspectives, Quantum Bits, Quantum Computation,
Quantum Information, Postulates of Quantum Mechanisms.
Total Periods: 40
2
Text Books
1. Michael A. Nielsen., Issac L. Chiang, (2002) “Quantum Computation and
Quantum Information”, Cambridge University Press, Fint South Asian edition.
2. Phillip Kaye , Raymond Laflamme , Michele Mosca , “An Introduction to
Quantum Computing”, Oxford.
Reference Book
1. Marco Lanzagorta, Jeffrey Uhlmann (2009). “Quantum Computer Science”,
Morgan and Claypool Publishers.
Course Outcomes:
CO1 Understand and explain the basic notions of Quantum Computing. K2
CO2 Identify the essential difference between the classical paradigm K3
and the quantum paradigm of computation and appreciate why
quantum computers can solve currently intractable problems.
CO3 Analyze the basic Quantum Classification Algorithms. K4
CO4 Understand the principle of quantum clustering. K3
CO5 Understand the emerging trends in quantum machine learning K2
with the help of case-studies.
CO to PO/PSO Mapping
2
6.2.9 Program Elective V (Semester II)
Course Code PDSE203
Course Title Applied Data Science
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To provide foundational knowledge of data analytics tools, and a literature-
based exploration of current research frontiers.
To study recent trends of data Science in various fields.
To develop understanding of the power of machine learning tools to formulate
and solve real-time problems.
Course Contents
Unit 1 Data Science in Healthcare 8
Smart Sensors for Healthcare and Medical Applications, Data Collection in
Healthcare: CRM (Customer Relationship Management Systems), EHR (Electronic
Health Records) and Mobile Applications, Predictive Methods for Disease/Drug
Detection and Prevention, Descriptive Analytics, Wearable Technology for
Diagnosis, Telemedicine.
2
Total Periods:40
Text Books
1. El Morr, Christo, and Hossam Ali-Hassan (2019). “Analytics in
Healthcare: a practical introduction”. Springer.
2. Mucherino, Antonio, Petraq Papajorgji, and Panos M. Pardalos (2009).
“Data mining in agriculture”. Vol. 34. Springer Science Business Media,
2009.
3. Cady, Field (2017). “The data science handbook”. John Wiley and Sons.
Reference Book
1. Subrahmanian, V. S., ed (2012). “Handbook of computational approaches
to counterterrorism”. Springer Science Business Media.
Course Outcomes
CO1 Understand and analyze the application of Data Science in K2
various fields.
CO2 Demonstrate the solutions based on Data Science in healthcare K2
and social media.
CO3 Analyze various applications of Data Science in academics, K6
education and cyber security.
CO4 Compare the various deep learning and machine learning K2
techniques for different data science applications.
CO5 Demonstrate a familiarity with applied Data Science approaches K3
and techniques to Forecast Weather/ Natural Calamities.
CO to PO/PSO Mapping
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO/PO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 2 2 - 3 - - - - - 3 - - 3 - 3
CO2 - - - - 3 - - - - - - - 3 - 3
CO3 2 2 - 3 1 - - - - - - - - - -
CO4 2 2 - 3 3 - - - 3 - - - - - -
CO5 2 2 - - 1 - - - - - - - - - 3
Score 8 8 - 9 8 - - - 3 3 - - 6 - 9
Course
2 2 - 3 2 - - - 3 3 - - 3 - 3
Mapping
2
6.2.10 Program Elective V (Semester II)
Course Code PDSE204
Course Title Data Visualization
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
• To develop skills to both design and critique visualizations.
• To introduce visual perception and core skills for visual analysis.
• To understand visualization for time-series analysis, ranking analysis, deviation.
analysis, distribution analysis, correlation analysis, multivariate analysis.
• To understand issues and best practices in information dashboard design.
Course Contents
Unit I: Core Skills for Visual Analysis 8
Information visualization, effective data analysis, traits of meaningful data, visual
perception, making abstract data visible, building blocks of information visualization,
analytical interaction, analytical navigation, optimal quantitative scales, reference lines
and regions, trellises and crosstabs, multiple concurrent views, focus and context,
details on demand, over-plotting reduction, analytical patterns, pattern examples.
2
Total Periods: 40
Text Books
1. Ben F. (2008). "Visualizing data: Exploring and explaining data with the
processing environment", O'Reilly.
2. Edward R. (2001). "The visual display of quantitative information", Second
Edition, Graphics Press.
3. Evan S. (2011). "The value of business analytics: Identifying the path to
profitability", Wiley.
Reference Books
1. Gert H. N., Jesper T (2010). "Business Analytics for Managers: Taking business
intelligence beyond reporting", Wiley.
2. Nathan Y. (2013). "Data Points: Visualization that means something", Wiley.
Course Outcomes:
CO1 Explain principles of visual perception. K2
CO2 Apply core skills for visual analysis. K4
CO3 Apply visualization techniques for various data analysis tasks. K4
CO4 Design information dashboard. K3
CO5 Design graphics. K2
CO to PO/PSO Mapping
2
6.2.11 Program Elective VI (Semester II)
Course Objectives:
● To understand the basics of blockchain and data science.
● To learn the use of data science for blockchain.
● To study and apply matrix factorization techniques.
● To understand the blockchain applications.
Course Contents
Unit-I Introduction 8
What is Blockchain, Blockchain Technology Mechanisms and Networks, Blockchain
Origins, Objective of Blockchain, Blockchain Challenges, Transactions and Blocks,
P2P Systems, Keys as Identity, Digital Signatures, Hashing, and public-key
cryptosystems, private vs. public Blockchain.
Unit-III Clustering 8
Collaborating to Create Better Models, Collecting data from a cohort, Building models
collaboratively, Discovering Association Rules in Data, Describing the apriori
association rules algorithm, Determining When to Use Clustering and Association
Rules.
Total Periods:40
IIITUPGCSE22 School of Computing 41
2
Textbooks
1. Laurence, T. (2019). “Blockchain for dummies”. John Wiley and Sons, 2019.
2. Liiv, I. (2021). “Data Science Techniques for Cryptocurrency Blockchains”.
Springer Singapore.
Reference Books
1. Hougan, M., Lawant, D. (2021). “Cryptoassets: The Guide to Bitcoin,
Blockchain, and Cryptocurrency for Investment Professionals”. CFA Institute
Research Foundation.
2. Liebi, L. J. (2021). “Antony Lewis: The basics of bitcoins and blockchains,”
Springer.
3. Lipton, A., and Treccani, A. (2021). Blockchain and Distributed Ledgers:
Mathematics, Technology, and Economics. World Scientific.
Course Outcomes:
CO1 Explain the fundamentals of blockchain technology. K2
CO2 Illustrate the applications of cryptocurrency. K2
CO3 Explain the basic concepts of clustering. K2
CO4 Compare several classification models. K5
CO5 Apply the data science techniques for blockchains. K3
CO to PO/PSO Mapping
2
6.2.12 Program Elective VI (Semester II)
Course Objectives:
• To learn the fundamental concepts in computer vision.
• To learn the basics of image feature detection and segmentation.
• To review and use deep learning models for computer vision.
• To make use of deep learning models for video analysis.
• To learn generative models and their application in computer vision tasks.
Course Contents
Unit I: Introduction 8
Computer Vision: A brief history, Image Formation: Geometric Primitives and
Transformations, Image Processing: Point Operators, Linear Filtering, Correlation,
Convolution, Fourier Transforms, Pyramid and wavelets, Geometric
Transformations, Global Optimization.
2
Unit V: Deep Generative Models and Applications in Vision 8
Review of (Popular) Deep Generative Models: GANs, VAEs, Other Generative
Models: Pixel-RNNs, NADE, Normalizing Flows, Applications: Image Editing,
Inpainting, Super-resolution, 3D Object Generation, Security; Variants: Cycle GANs,
Progressive GANs, Stack GANs, Pix2Pix, Recent Trends: Zero-shot, One-shot,
Few-shot Learning, Self-supervised Learning, Reinforcement Learning in Vision.
Total Periods:40
Text Books
1. Szeliski, R. (2010). “Computer Vision: Algorithms and Applications”,
Springer.
2. Goodfellow, I., Bengio Y., Aaron, C. (2016). “Deep Learning”, MIT Press.
Reference Books
1. Prince, S. J. D. (2012). “Computer Vision: Models, Learning, and Inference”,
Cambridge University Press.
2. Nielsen, M. (2016). “Neural Networks and Deep Learning”, Springer.
Course Outcomes:
CO to PO/PSO Mapping
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
CO/PO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 2 2 3 1 1 - - 3 - - - - 1 2 2
CO2 2 3 3 3 1 - - - - - - 3 3 2 2
CO3 2 3 3 3 1 - - - - - - 3 3 2 2
CO4 2 3 3 3 1 - - - - - - 3 3 2 2
CO5 3 3 3 3 1 - - 3 - - - 3 3 3 3
Score 11 14 15 13 5 - - 6 - - - 12 13 11 11
Course
2 3 3 3 1 - - 3 - - - 3 3 2 2
Mapping
2
6.3 Program Electives (PE)
(Specialization in Cyber Security)
2
6.3.1 Program Elective I (Semester I)
Course Objectives
To study the mathematical fundamentals that is prerequisites for understanding
the variety of problems like network protocols, analysis of web traffic, computer
security, etc.
To understand and formulate problems in the domain of network security.
To learn various statistical analysis tools for mining web data.
Course Contents
Unit I: Probability Theory 8
Distribution Function: Probability mass, density, and cumulative distribution
functions, Conditional probability, Expected value, Applications of the Univariate
and Multivariate problems. Probabilistic inequalities, Random samples, sampling
distributions of estimators and Maximum Likelihood.
2
Text Books
1. John V. (2015). “Foundation Mathematics for Computer Science”, Springer
International Publishing.
2. Metcalf, L., and Casey, W. (2016). Cybersecurity and applied mathematics.
Syngress.
Reference Book
1. Christen, M., Bert G., and Michele L. (2010). “The ethics of cybersecurity”.
Springer Nature.
2. Daras, N. J., and Rassias, T. M. (Eds.). (2017). Operations Research,
Engineering, and Cyber Security: Trends in Applied Mathematics and
Technology (Vol. 113). Springer.
Course Outcomes
CO1 Explain the fundamentals of discrete and continuous probability. K2
CO2 Illustrate the applications and uses of number theory. K2
CO3 Solve basic cyber security problem using graph theory. K2
CO4 Compare linear programming techniques. K5
CO5 Apply the number theory for cryptography problems. K3
CO to PO/PSO Mapping
2
6.3.2 Program Elective I (Semester I)
Course Code PCBE102
Course Title Network Security
Number of Credits 3-1-0-4
Course Type PE
Course Objectives:
To identify the basic networking principles.
To understand the need for network security.
To expose themselves to security at various network layers.
Course Contents
Unit I Fundamentals of Networks 8
Networking Technology, Connecting Devices, The OSI Model, TCP/IP Model, Threats
to Network communications, Wireless Network Security, Denial of Service,
Distributed Denial of Service.
Total Hours:40
2
Text Books
1. Man Y. (2003), “Internet Security: Cryptographic Principles”, “Algorithms and
Protocols”, Wiley Publications.
2. Matt Bishop (2004), “Introduction to Computer Security,” Addison-Wesley.
Reference Books
1. Charles P. (2006). “Security in Computing”, Prentice Hall.
2. William S. (2013). “Cryptography and Network Security”, Pearson.
Course Outcomes
CO to PO/PSO Mapping
2
6.3.3 Program Elective II (Semester I)
Course Code PCBE103
Course Title Principles of Cryptography
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To understand the foundations of cryptographic attacks.
To gain knowledge of encrypting data, and to choose between different algorithms.
To prepare students for research in the area of cryptography and enhance student’s
communication and problem-solving skills.
To effectively apply their knowledge to the construction of secure cryptosystems.
Course Contents
Unit-I: Classical Cryptography 8
Introduction: Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher,
The Affine Cipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher,
Stream Ciphers, Cryptanalysis.
2
Total Periods:40
Text Books
1. William Stallings (2006). “Cryptography and Network Security: Principles and
Practice”, 4th ed., Pearson Education, India.
2. Matt Bishop (2004), “Introduction to Computer Security,” Addison-Wesley.
Reference Books
1. Charlie K. (2002). “Network Security: Private Communication in a Public
World”, Prentice Hall.
2. Atul K. (2008). “Cryptography and Network Security”, Tata Mc Grawhill.
Course Outcomes
CO to PO/PSO Mapping
2
6.3.4 Program Elective II (Semester I)
Course Objectives:
To understand the concept of digital forensic and its terminology.
To understand technical and legal aspects of computer crime investigations.
In depth understanding of attacks and their counter measures.
Information of how to apply defense through data analysis and file system analysis.
To learn the procedures of recovering computer evidence and seize process.
Course Contents
Unit I: Introduction 8
Computer forensics fundamentals, Benefits of forensics, computer crimes, computer
forensics evidence and courts, legal concerns and private issues.
2
Total Periods:40
Text Books
1. Warren G., Jay G. H. (2002). “Computer Forensics: Incident Response
Essentials”, Addison Wesley.
2. Nelson, B, Phillips, A, Enfinger, F, Stuart, C. (2004). “Guide to Computer
Forensics and Investigations”, Thomson Course Technology.
Reference Books
1. Vacca, J (2005). “Computer Forensics, Computer Crime Scene Investigation”,
Charles River Media.
2. Pramanik, S., Ghonge, M. M., Mangrulkar, R. (2022). “Cyber Security and Digital
Forensics: Challenges and Future Trends”. John Wiley and Sons.
Course Outcomes
CO to PO/PSO Mapping
2
6.3.5 Program Elective III (Semester I)
Course Objectives:
To learn the fundamentals of machine learning and cyber security.
To study different technologies used in machine learning and cyber security.
To learn the functionality of data driven networks.
To understand the role of machine learning in cyber security.
Course Contents
Unit 1: Foundations of Machine Learning for Security 8
Introduction to supervised learning models: Logistic regression, Naive Bayes, neural
networks, deep learning models. Introduction to unsupervised learning models: PCA,
K-means, Gaussian mixture models, Building a machine learning pipeline in R.
Total Periods: 40
2
Text Books
1. Stallings W., Brown L. (2018). “Computer Security: Principles and Practice”
Pearson.
2. Tom, M. (2017). “Machine Learning”, McGraw-Hill.
3. Stamp M. (2011). “Information Security: Principles and Practices”, Wiley.
Reference Books
1. Ethem, A. (2005). “Introduction to Machine Learning”, PHI.
2. Stallings W. (2017). “Cryptography and Network Security: Principles and
Practice”, Pearson.
Course Outcomes
CO to PO/PSO Mapping
2
6.3.6 Program Elective III (Semester I)
Course Code PCBE106
Course Title Advanced Computer Network
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To understand the TCP/IP architecture.
To study packet switching networks and routing in packet switching networks
with different routing algorithms.
To study traffic management at packet level, flow level and flow and aggregate
levels of packet switching networks
To learn QoS tunneling and overlay networks for understanding mobile
networking.
2
Unit V: Next Generation Network 8
Unicast Routing Protocols: RIP, OSPF; Multicasting And Multicast Routing Protocols:
Introduction, Multicast Addresses, IGMP, Multicast Routing, Routing Protocols,
MBone, Emerging applications: VoIP, SIP, video over P2P Mobile IP.
Total Periods: 40
Text Books
1. Behrouz A. Forouzan (2017). “TCP/IP Protocol Suite”, McGraw- Hill, 4th
Edition.
2. Larry L. Peterson, Bruce S. Davie (2021). “Computer Network: A System
Approach”, Morgan Kaufmann, 6th Edition.
Reference Books
1. Schiller, J. (2010). “Mobile Communications”, Pearson Addison-Wesley, 2nd
Edition.
2. Stallings W. (2017). “Cryptography and Network Security: Principles and
Practice”, Pearson.
3. James F. Kurose, Keith W. Ross (2016). “Computer Networking”, Pearson.
Course Outcomes
CO1 Understand the architecture of TCP/IP, switching, routing and K3
emerging applications.
CO2 Describe traffic management at packet level, flow level and flow K3
and aggregate levels of packet switching networks.
CO3 Apply the knowledge about QoS, tunneling and overlay networks K4
and to understand mobile networking.
CO4 Understand the ethics and responsibility in cybersecurity K3
applications.
CO5 Apply the knowledge about QoS, tunneling and overlay networks K4
and to understand mobile networking and wireless networking
CO to PO/PSO Mapping
2
6.3.7 Program Elective IV (Semester II)
Course Objectives:
To learn various hacking techniques and attacks.
To understand the benefits of strategic planning process.
To evaluate where information networks are most vulnerable.
To perform tests into secure networks for evaluation purposes.
Course Contents
Unit I: Ethical Hacking: Overview 8
Understanding the importance of security, Concept of ethical hacking and essential
Terminologies-Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit. Phases
involved in hacking, System Hacking, Session Hijacking
2
Unit V: Hacking Wireless Networks: Attacking Authentication 8
Attacking Session Management, Design Flaws in Authentication Mechanisms
Attacking Forgotten Password Functionality, attacking Password change functions.
Countermeasures to authentication attacks Attacking other users: Reflected XSS
Vulnerabilities, Stored XSS Vulnerabilities, DOM-Based XSS Vulnerabilities, HTTP
Header Injection. Countermeasures to XSS.
Total Periods: 40
Text Books
1. Patrick E. (2013). “The Basics of Hacking and Penetration Testing”. Elsevier.
2. Khare, R. (2006). “Network Security and Ethical Hacking”. Luniver Press.
Reference Books
1. Thomas M. (2003). “Ethical Hacking”, OSB Publisher.
2. Stuart M., Joel S., George K. (2005). “Hacking Exposed: Network Security
Secrets and Solutions”, McGraw-Hill.
Course Outcomes
CO to PO/PSO Mapping
2
6.3.8 Program Elective IV (Semester II)
Course Objectives:
To understand the honeypots, multiple IDS methods, tools to analyze various types
of attacks like wireless attacks and their detection.
To understand the attack source and also provides practical knowledge for dealing
with intrusions in real world applications.
Course Contents
Unit I Introduction to IDPS 8
IDPS Technologies, Components and Architecture Implementation Uses of IDPS
Technologies, Key Functions, Common Detection Methodologies Signature, Anomaly
and Stateful Protocol Analysis, Types of IDPS Technologies.
Host and Network IDPS 8
Application, Transport, Network and Hardware Layer attacks, Sniffing Network Traffic,
Replay Attacks, Command Injection, Internet Control Message Protocol Redirect,
DDoS, Dangers and defences with Man-in the Middle, Secure Socket Layer attacks,
DNS Spoofing, Defence in-Depth Approach, Port Security, Use Encrypted Protocols.
Total Periods: 40
IIITUPGCSE22 School of Computing 60
2
Text Books:
1. Shui Y. (2014). “Distributed Denial of Service Attack and Defense”, Springer.
2. Yuri D., Erdal O. (2018). “Cybersecurity Attack and Defense Strategies”,
PACKT Publication.
Reference Books:
1. John H., Hoopes, J. (2009). “Virtualization for security: including sandboxing,
disaster recovery, high availability, forensic analysis, and honeypotting”.
Syngress.
2. Karen S. and Peter M. (2007). “Guide to Intrusion Detection and Prevention
Systems”, NIST Special Publication.
Course Outcomes
CO1 Understand the intrusion detection and prevention technologies, K2
various types of network behavior analysis.
CO2 Analyze various types of attacks like wireless attacks and their K4
detection and to understand the honeypots, multiple IDS
methods, tools.
CO3 Apply the practical knowledge for dealing with intrusions in real K3
world applications.
CO4 Analyze and evaluate the attack sources. K5
CO5 Understand the different vulnerabilities and manage the recovery K2
process.
CO to PO/PSO Mapping
2
6.3.9 Program Elective V (Semester II)
Course Objectives:
To study malware analysis and malware detection.
To make familiar with basic and advanced malware analysis techniques.
To analyze malicious Windows executables and documents and develop
professional quality malware analysis report.
To identify common indicators of infection and characteristics of different
types of malwares.
To learn how to detect different types of malwares.
Course Contents
Unit I: Introduction 8
Introduction-Definition of Malware Analysis, Classification of Malware, Malware
attack lifecycle, Malware Analysis in Virtual Machines, Malware Components,
Malware Packers, Code Injection, Process Hollowing, and API Hooking.
2
Unit V: Malware detection 8
Antivirus Engines, IDS/IPS, hook and rootkit Detection module, malware Sandbox,
binary instrumentation, Anti-reverse engineering: Anti-Disassembly, Anti-Debugging
and obfuscation.
Total Periods:40
Text Books
1. Michael S. and Andrew H. (2012). “Practical Malware Analysis: The Hands-
On Guide to Dissecting Malicious Software”, No Starch Press Publication.
2. Abhijit M., Anoop S. (2020). “Malware Analysis and Detection Engineering:
A Comprehensive Approach to Detect and Analyze Modern Malware”, Apress
Publication.
Reference Books
1. Mannappa K A (2018). “Learning Malware Analysis: Explore the concepts,
tools, and techniques to analyze and investigate Windows malware”, Packt
Publishing.
2. Alexey K., Amr T. (2019). “Mastering Malware Analysis” Packt Publishing.
Course Outcomes
CO1 Understand the types of malware, including rootkits, Trojans, and K2
viruses.
CO2 Perform basic Static and Dynamic analysis for malware analysis K5
with antivirus scanning, strings and sandbox.
CO3 Apply advanced static analysis and dynamic analysis for malware K4
analysis.
CO4 Analyze malware behaviour for different files and documents. K4
CO5 Experiment with Antivirus Engines, IDS/IPS, and Sandbox for K3
malware detection.
CO to PO/PSO Mapping
2
6.3.10 Program Elective V (Semester II)
Course Objectives:
To learn fundamentals of Reverse engineering.
To study different Static and Dynamic Reversing Assessment
techniques.
To identify and resolve various security threats and risks.
To understand the role of Reverse engineering in cyber security.
Course Contents
Unit I: Introduction to Reverse engineering 8
What is reverse engineering, Reverse engineering process, Types of tools used in
reverse engineering, Tools, reverse engineering analyzing and handling Malware, basic
setup for malware handling, Typical malware behavior, Tools used to identify hidden
components.
Total Periods:40
IIITUPGCSE22 School of Computing 64
2
Text books
1. Reginald W. (2018). “Mastering Reverse Engineering: Re-engineer your
ethical hacking”, skills”, Packt Publishing.
2. Alexey Kleymenov, Amr Thabet (2019). “Mastering Malware Analysis” Packt
Publishing.
Reference Books
1. Bruce D., AlexandreGazet, E. (2014). “Practical Reverse Engineering”, Wiley
Publishers.
2. Eld E. (2005). “Reversing: Secrets of Reverse Engineering”, Wiley Publishers.
Course Outcomes
CO to PO/PSO Mapping
2
6.3.11 Program Elective VI (Semester II)
Course Code PCBE205
Course Title Block Chain Technology
Number of Credits 3-0-4-5
Course Type PE
Course Objectives:
To learn the fundamentals of Cryptography and Blockchain.
To study different technologies used in BitCoin and Cryptocurrency.
To learn the functionality of Distributed Consensus.
To understand the blockchain applications.
Course Contents
Unit I: Introduction of Cryptography and Blockchain 8
What is Blockchain, Blockchain Technology Mechanisms and Networks, Blockchain
Origins, Objective of Blockchain, Blockchain Challenges, Transactions and Blocks,
P2P Systems, Keys as Identity, Digital Signatures, Hashing, and public key
cryptosystems, private vs. public Blockchain.
2
Unit-V Cryptocurrency Regulation 8
Stakeholders, Roots of Bit coin, Legal Aspects- Crypto currency Exchange, Black
Market and Global Economy. Applications: Internet of Things, Medical Record
Management System, Domain Name Service and future of
Blockchain.
Total Periods: 40
Text Books
1. Laurence, T. (2019). Blockchain for dummies. John Wiley and Sons, 2019.
2. Liiv, I. (2021). Data Science Techniques for Cryptocurrency Blockchains.
Springer.
Reference Books
1. Hougan, M., Lawant, D. (2021). “Cryptoassets: The Guide to Bitcoin,
Blockchain, and Cryptocurrency for Investment Professionals”. CFA Institute
Research Foundation.
2. Liebi, L. J. (2021). “Antony Lewis: The basics of bitcoins and blockchains”,
Springer.
Course Outcomes
CO1 Explain the fundamentals of Cryptography and Blockchain. K3
CO2 Examine the functionality of Bitcoin and Cryptocurrency. K4
CO3 Analyze the role of distributed consensus. K4
CO4 Analyze different block chain applications and solidity K3
programming
CO5 Examine the different regulations for cryptocurrency regulations. K4
CO6 Simulate Bitcoin mining K6
CO to PO/PSO Mapping
2
6.3.12 Program Elective VI (Semester II)
Course Objectives:
To learn the fundamentals of security in mobile communication and
applications.
To study different levels of security.
To learn the functionality of Application Level Security.
To understand the working of Encryption.
Course Contents
Unit: I Security 8
Security Issues in Mobile Communication: Mobile Communication History, Security
Wired Vs Wireless, Security Issues in Wireless and Mobile Communications, Security
Requirements in Wireless and Mobile Communications, Security for Mobile
Applications, Advantages and Disadvantages of Application level Security.
Unit V: Encryption 8
Data Center Operations Security challenges, implement five Principal Characteristics
of Cloud Computing, Data center Security Recommendations Encryption for
Confidentiality and Integrity, Encrypting data at rest, Key Management Lifecycle,
Cloud Encryption Standards.
Total Periods: 40
IIITUPGCSE22 School of Computing 68
2
Text Books
1. Elenkov, N. (2014). “Android security internals: An in-depth guide to
Android's security architecture”. No Starch Press.
2. Bergman, N., Stanfield, M., Rouse, J., Scambray, J. (2013). “Hacking exposed:
Mobile security secrets and solutions”. McGraw-Hill.
Reference Books
1. Neil B., Mike S., Jason R., and Joel S. (2016), “Hacking Exposed Mobile:
Security Secrets and Solutions”. Springer.
2. Schwartz, M. (2005). “Mobile wireless communications”, Vol. 25. Cambridge:
Cambridge University Press.
Course Outcomes
CO1 Explain the fundamentals of security. K3
CO2 Examine the functionality of security in devices. K4
CO3 Analyze the role of application level security. K4
CO4 Analyze different block chain applications and solidity K3
programming.
CO5 Examine the working of Encryption. K4
CO6 Simulate secure devices for data transmission. K6
CO to PO/PSO Mapping
2
Course Outcome Survey Form
Date:
Course Code : Course Name : Year/Semester: Faculty:
Signature of Student
2
M.Tech. CSE
(Specialization in Data Science/Cyber Security)
Program Survey Form
(By Final Year M. Tech. Students) Date:
1. Course Outcomes
Overall, Your satisfaction on the following statements: Very Generally Generally Very
Satisfied Satisfied dissatisfied dissatisfied
How current the content is in most subjects in your
courses?
How interesting the teaching is in most subjects in
your courses?
The variety of courses offered in your programme.
How helpful and accurate the academic advising is in
your course?
How helpful and accurate the career counselling is in
your programme?
How challenging the work is intellectually in most
courses in your programme?
The overall educational experience in your
programme.
2. About Faculty
To what extent do you agree or disagree with the Strongly Agree Disagree Strongly
following statements: Agree Disagree
Faculties are good at explaining things
Faculties are good at motivating me to do my best work
2
Opportunities to be involved with other students outside
of class
Being informed about things in the department
4. Skill Development
What extent does your coursework in your major Strongly Agree Disagree Strongly
improve the following skills? Agree Disagree
Communication skills
Writing skills
Interpersonal relationship skills
Self-reliance skills
Decision-making skills
Ability to execute plans
Ability to work in groups on projects
Leadership skills
Analytical skills
Research skills
Making logical judgements
Producing independent work
Understanding my strengths and weaknesses
Achieving personal goals
Achieving career goals
My education from IIITU is important to me
5. Professional Ethics
What extent do you agree or disagree with the Strongly Agree Disagree Strongly
following statements Agree Disagree
I show respectful behavior toward faculty and other
students in most of my classes
I actively participate in most class discussions
I usually attend my classes
I usually read the text or other readings prior to class
I study extensively for exams and quizzes
I study a few days before the cycle tests/ end semester
exam
I complete all course assignments as explained in
syllabus
I ask for help from most of my faculty when I need it
I am motivated to learn course materials
I care about what grade I will receive in most courses
Signature of student
2
Alumni Survey Form
(Assessment of Outcomes - M. Tech. (CSE)
Name :
Year of Post-Graduation:
Organization :
Address :
Phone : Email:
2
Employer/Scholar Survey Form
Date: / /
2
Course Registration Form
This form must be submitted on the day of Registration of Courses First working day of
the odd/even semester, attaching the proof for fee payment.
Date:
Student Name: Roll No.:
Program: M.Tech. (CSE) Specialization: DS/CS
AY: 20 to 20 Semester:
1
2
3
4
5
6
7
8
9
10
2
8:30- 9:20- 10:30- 11:20- 13:30- 14:20- 15:20- 16:10-
Day
9:20 10:10 11:20 12:10 14:20 15:10 16:10 17:00
Mon
L
B
U
Tue
N
R
Wed C H
E
B
R
A
Thur
A
K
Fri
2
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22
IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22 IIITUPGCSE22