Computer_Science_MSC
Computer_Science_MSC
Sc in Computer Science
with specialization in
Networking and Cyber Security/ Data Analytics
Faculty of Science
Department of Computer Science
St. Xavier’s University, Kolkata
M.Sc Computer Science - Curriculum
Programme Outcomes
PO 1: Ability to apply mathematical, statistical and programming knowledge to tackle challenging
problems
PO 2: Gaining keen understanding of the hardware aspect of a system and its relationship with software
PO 3: Conducting rigorous experimentation to analyze and interpret data
PO 4: Building models which are technically robust and in-line with best computing practices
PO 5: Understanding the internal details of a computational process for identification and correction
of erroneous scenarios
PO 6: Analyzing the proposed solution to a problem based upon well-defined computational
parameters
PO 7: Learning to document research findings in a scientific and systematic manner
PO 8: Recognizing learning as a lifelong process and the need tobeing self-taught
M.Sc. Computer Science with specializations in:
1. Networking and Cyber Security
2. Data Analytics
Semester–II
Number of Papers: 6
Course Credits in each course
Course code Course Title
Type Theory Practical Tutorial Credits Total Marks
MCSR210C Core 3 1 0 4 [20(CIA) +
Cryptography and Cryptanalysis 60(T)] + 20(P)
Semester–III
Number of Papers: 5+2
Course Course Title Course Credits in each course
code Type Theory Practical Tutorial Credits Total Marks
MCSR310C Computer Vision Core 3 2 0 5 [20(CIA) +
40(T)] + 40(P)
MCSR320C Data Warehouse and Mining Core 3 2 0 5 [20(CIA) + 40(T)]
+ 40(P)
MCSR330T Mobile and wireless Computing Core 2 0 0 2 20(CIA) + 80(T)
Specialization Bucket: 01 (Networking and Cyber Security)
MCSR341T Cloud Computing Core 4 0 0 4 20(CIA) + 80(T)
MCSR351T Network Security 4 0 0 4 20(CIA) + 80(T)
Specialization Bucket: 02 (Data Analytics)
MCSR342T Business Intelligence Core 4 0 0 4 20(CIA) + 80(T)
MCSR352T Deep Learning 4 0 0 4 20(CIA) + 80(T)
MCSR360P Smart Analytics System Design Core 0 2 0 2 20(CIA) + 80(P)
Lab
MCSR370J Project – Phase 1 Core 0 0 2 2 20(CIA) + 80(J)
Total 16 6 2 24 700
Semester–IV
Number of Papers: 3+3
Course code Course Title Course Credits in each course
Type Theory Practical Tutorial Credits Total Marks
Specialization Bucket: 01 (Networking and Cyber Security)
MCSR411T Security for Business Core 4 0 0 4 20(CIA) + 80(T)
Infrastructure, Cyber Law and
Ethics
MCSR421T Security for Cyber-Physical 4 0 0 4 20(CIA) + 80(T)
Systems
MCSR431T IOT and Smart Systems 4 0 0 4 20(CIA) + 80(T)
Specialization Bucket: 02 (Data Analytics)
MCSR412T Bio-informatics Core 4 0 0 4 20(CIA) + 80(T)
MCSR422T NLP and Text Analytics 4 0 0 4 20(CIA) + 80(T)
MCSR432T Social Network Analytics 4 0 0 4 20(CIA) + 80(T)
MCSR440J Term Paper Core 0 0 2 2 20(CIA) + 80(P)
MCSR450J Project – Phase II ** Core 0 0 8 8 40(CIA) + 160(P)
MCSR460V General Viva-Voce Core 0 0 2 2 20(CIA) + 80(P)
Total 12 0 12 24 700
*CIA: Continuous Internal Assessment, T: Theory, P: Practical and C: Combine
Suggested Books
1. T. H. Cormen et al -Introduction to Algorithms , PHI
2. E. Horowitz, S. Sahani - Fundamentals of Computer Algorithms – Galgotia
3. Bratley et al - Fundamentals of Algorithms-PHI
For the practical portion, special reference may be given to Operating System as a concurrent program in UNIX
environments
Suggested Books
1. Tanenbum,A.S., Distributed Operating Systems ,Pearson Education.
2. Singhal,Shivaratri, Advanced Concepts in Operating Systems, TMH.
3. P.K.Sinha, Distributed Operating Systems, PHI
4. D.M. Dhamdhere, Operating Systems – A Concept Based Approach, Second Edition, TMGH, 2006, New Delhi
Unit V: Parsers
Recursive descent, LL(1), LR(0), SLR(1), LALR(1), CLR(1)
Suggested Books
1. Introduction to Automata Theory, Languages, and Computation by John E. Hopcroft,
Rajeev Motwani, Jeffrey D. Ullman, 3rd Edition, Pearson.
2. Theory of Computer Science (Automata, Languages & Computation) by K L P Misra &
N Chandrasekharan, 3rd Edition, PHI.
3. Switching and Finite Automata Theory by ZviKohavi, Niraj.K.Jha, 3rd Edition, TMH.
4. Formal Language and Automata, P. Linz, Narosa
For the practical portion, all statistical techniques are to be covered on popularly available data sets or synthetic
data sets created using random values
Suggested Books
1. Practical Statistics for Data Scientists, 2e: 50+ Essential Concepts Using R and Python by Peter Bruce, Andrew
Bruce, Peter Gedeck, O’Reilly
2. Head First Statistics: A Brain-Friendly Guide by Dawn Griffiths, O’Reilly
3. Think Stats: Exploratory Data Analysis, Second Edition by Allen Downey, O’Reilly
Suggested Books
1. Elaine Rich and Kevin Knight: Artificial Intelligence, TMH
2. Dan W. Patterson: Introduction to Artificial Intelligence and Expert Systems, PHI
3. S. Russel and P. Norvig, "Artificial Intelligence, A modern Approach"
Suggested Books
1. Computer Security: Art and Science, M. Bishop, Pearson Education.
2. Information Security: Principles and Practice, M. Stamp, John Wiley & Sons.
3. Cryptography and Network Security, William Stallings, Eastern Economy Edition, PHI.
4. Cryptography and Network Security, Behrouz A Forouzan, McGraw Hill Education.
MCSR220C: Machine Learning
Unit I: Classification and Regression Models: KNN
How classification works, Data Matrix Notation, Classification v/s Regression (examples), KNN intuition, Failure cases
of KNN, Distance measures: Euclidean, Manhattan, Minkowski, Hamming, Cosine Distance and Cosine Similarity,
Measuring effectiveness of KNN, Test/Evaluation time and Space Complexity, KNN Limitations, Decision surface for
KNN as K changes, Overfitting and Underfitting, Cross validation, KNN for regression,
For the practical portion, the case studies listed under Unit V are to be implemented
Suggested Books
1. Machine Learning by Tom M. Mitchell, TMH
2. Machine Learning by Saikat Dutt et al , Pearson
3. Introduction to Machine Learning with Python: A Guide for Data Scientists by Andreas Muller, O’Reilly
4. Hands-On Machine Learning with Scikit-Learn, Keras and Tensor Flow: Concepts, Tools and Techniques to Build
Intelligent Systems by Aurelian Geron, O’Reilly
5. Deep Learning (Adaptive Computation and Machine Learning Series) by Ian Goodfellow, et. al, The MIT Press
Suggested Books
1. Ray, Bhurchandi ,Advanced Microprocessors and Peripherals, TMH
2. Mazidi, McKinlay, The 8051 Microcontroller and Embedded Systems, Pearson – Prentice Hall
3. Barry Brey, The Intel Microprocessors: TMH
4. Computers as Components: Principles of Embedded Computing System Design (The Morgan Kaufmann Series in
Computer Architecture and Design) by Wayne Wolf
5. Embedded Systems - Architecture, Programming and Design by Raj Kamal, McGraw Hill Publishers
Suggested Books
1. Software Engineering: A Practitioner’s Approach by R.S. Pressman, McGraw-Hill
2. Fundamentals of Software Engineering by R. Mall, PHI
3. Software Engineering by I. Sommerville, Addison Wesle
4. Software Engineering for Students by D. Bell, Addison-Wesley
MCSR250C: Operation Research and Research Methodology
Unit I: Introduction
Definition, Concept, Meaning, Phases, Scope, Advantages, Disadvantages, Mathematical Modeling of Real Life
Problems
Suggested Books
1. Operations Research by Kanti Swarup, P.K. Gupta, Man Mohan, Sultan Chand & Sons
2. Schaum's Outline of Operations Research, Richard Bronson and Govindasami
Naadimuthu, McGraw-Hill Education
3. Operations Research: An Introduction, Hamady.A. Taha, TMH
4. Research Methodology : Methods And Techniques by C.R. Kothari and Gaurav Garg, New Age International
Publishers
5. Research Methodology : Methods And Techniques by R K Jain, Vayu Education of India
6. Research Methodology: Concepts And Cases by Deepak Chawla and Neena Sondhi, Vikas Publishing House
Semester–III
MCSR310C Computer Vision [20(CIA) + 40(T)] + 40(P)
Unit 1: Digital Image formation and low-level processing
Overview and State-of-the-art techniques, Fundamentals of image formation, Transformation: Orthogonal,
Euclidean, Affine, Projective etc., Image Enhancement, Restoration, Histogram processing
Unit 2: Feature Extraction
Edges-Canny, Line detectors (Hough Transform), Harris-Corners and Hessian Affine, Orientation
Histogram, Feature Selection: Principal Component Analysis (PCA)
Unit 3: Image Segmentation: Region Growing, Edge Based approaches to segmentation, Graph-Cut, Mean-
Shift, MRFs, Texture Segmentation, Object Detection
Unit 4: Object Detection and Classification: Feature Based, Deep Learning Based
Unit 5: Case Study: Human Iris Location, hole detection, Generalized Hough Transform (GHT), Spatial
matched filtering, object location, health, agriculture and biometric application
LAB:
OpenCV: Installation and setup, Basic image operations, mathematical operations on images, bitwise
operations, image annotations, QR code detection, using mouse, video I/O
Suggestedbook
• "Computer Vision: A Modern Approach", by Forsyth and Ponce
• "Multiple View Geometry in Computer Vision", by Hartley and Zisserman
• Richard Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag London Limited
2011.
• Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education, 2003.
• Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision, Second
Edition, Cambridge University Press, March 2004.
• Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006
• R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley, 1992.
• K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition, Academic Press,
Morgan Kaufmann, 1990.
Suggested Books:
• Data Mining Concepts and Techniques by Jiawei Han and Micheline Kamber, MorganKaufmann
Publishers.
• Data Warehousing, Data Mining and OLAP by Berson, Tata McGraw Hill.
• Introduction to Data Mining by Pang-Ning Tan, Michael Steinbach, Vipin Kumar,
PearsonEducation.
• Data mining: Introductory and Advanced Topics by Dunham M H,” Pearson Education.
• Mining Concepts, Methods and Algorithms by Mehmed Kantardzic, John Wiley andSons.
• Big Data Simplified bySayan Goswami Sourabh Mukherjee , Amit Kumar Das.
Suggested Books -
• Wireless Communications: Principles and Practice, by Theodore S. Rappaport, Prentice Hall.
• 802.11n: A Survival Guide, by Matthew Gast, O'Reilly Media.
• 802.11ac: A Survival Guide, by Matthew Gast, O'Reilly Media.
• Wireless Networking Complete, by Pei Zheng et al., Morgan Kaufmann.
UNIT II
Cloud resources: Network and API - Virtual and Physical computational resources - Data-storage.
Virtualization concepts - Types of Virtualization- Introduction to Various Hypervisors - High Availability
(HA)/Disaster Recovery (DR) using Virtualization, Moving VMs .
UNIT III
Service models - Infrastructure as a Service (IaaS) - Resource Virtualization: Server, Storage, Network -
Case studies. Platform as a Service (PaaS) - Cloud platform & Management: Computation, Storage - Case
studies. Software as a Service (SaaS) - Web services - Web 2.0 - Web OS - Case studies – Anything as a
service (XaaS).
UNIT IV
Cloud Programming and Software Environments – Parallel and Distributed Programming paradigms –
Programming on Amazon AWS and Microsoft Azure – Programming support of Google App Engine –
Emerging Cloud software Environment.
UNIT V
Cloud Access: authentication, authorization and accounting - Cloud Provenance and meta-data - Cloud
Reliability and fault-tolerance - Cloud Security, privacy, policy and compliance- Cloud federation,
interoperability and standards.
Suggested Books:
• Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James Broberg, Andrzej M.
Goscinski, Wiley,2011
• Enterprise Cloud Computing - Technology, Architecture, Applications, Gautam Shroff, Cambridge
University Press, 2010
• Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010
• Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz, Russell
Dean Vines, Wiley- India,2010
UNIT-II
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes ofoperation,
location of encryption devices, key distribution Approaches of Message Authentication,Secure Hash
Functions and HMAC.
UNIT-III
Public key cryptography principles, public key cryptography algorithms, digital signatures,
digitalCertificates, Certificate Authority and key management Kerberos, X.509 Directory
AuthenticationService.
UNIT-IV
Email privacy: Pretty Good Privacy (PGP) and S/MIME.IP Security Overview, IP Security Architecture,
Authentication Header, Encapsulating Security Payload, Combining Security Associations and
KeyManagement.
UNIT-V
Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3. Intruders, Viruses and related
threats. Firewall Design principles, Trusted Systems. Intrusion Detection Systems.
Suggested Books
• Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
• Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, JoeGrand, David
Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, Wiley Dreamtech
• Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.
• Network Security - Private Communication in a Public World by CharlienKaufman, Radia
Perlmanand Mike Speciner, Pearson/PHI.
• Cryptography and network Security, Third edition, Stallings, PHI/Pearson
• Principles of Information Security, Whitman, Cengage Learning.
Suggested Books–
• Business Intelligence (IBM ICE Publication).
LIST OF EXPERIMENTS:
1: Feature Selection from Video and Image Data
2: Image and video recognition
3: Image Colorization
4: Aspect Oriented Topic Detection & Sentiment Analysis
5: Object Detection using Autoencoder
Suggested Books
• Deep Learning A Practitioner’s Approach Josh Patterson and Adam Gibson O’Reilly Media,
• Inc.2017
• Learn Keras for Deep Neural Networks, JojoMoolayil, Apress,2018
• Deep Learning Projects Using TensorFlow 2, Vinita Silaparasetty, Apress, 2020
• Deep Learning with Python, FRANÇOIS CHOLLET, MANNING SHELTER ISLAND,2017
• Pro Deep Learning with TensorFlow, SantanuPattanayak, Apress,2017
Unit 2: Hybrid Cloud Security Enterprise Shift to Hybrid Cloud, Workload Micro-Segmentation, Defense in
Depth through Micro-Segmentation, Cloud Access Security Brokers, Advanced Hybrid Cloud Security
Architecture , Security of Isolated Servers
Unit 3: Introduction to Cyber security Defining Cyberspace and Overview of Computer and Web-
technology, Architecture of cyberspace, Communication and web technology, Internet, World wide web,
Advent of internet, Internet infrastructure for data transfer and governance, Internet society, Regulation of
cyberspace, Concept of cyber security, Issues and challenges of cyber security
Unit 4: Cyber crime and Cyber law Classification of cyber crimes, Common cyber crimes- cyber crime
targeting computers and mobiles, cyber crime against women and children, financial frauds, social
engineering attacks, malware and ransomware attacks, zero day and zero click attacks, Cybercriminals
modus-operandi , Reporting of cyber crimes, Remedial and mitigation measures, Legal perspective of cyber
crime, IT Act 2000 and its amendments, Cyber crime and offences, Organizations dealing with Cyber crime
and Cyber security in India, Case studies
Unit 5: Blockchain, Anonymity, and Critical Infrastructure Protection: Blockchain, Cyber Attribution
Onion Routing and Tor Chaum Binding Algorithm
Suggested Books:
• Cyber Security and IT Infrastructure Protection, John R. Vacca, Syngress Publisher, O’Reilley
• Cyber Law and Ethics: Regulation of the Connected World, Eric P. Robinson and Mark Grabowski,
Routledge; 1st edition
Unit IV: Developing IoTsIntroduction to Python and IoT tools, Developing applications through IoT tools,
Developing sensorbased application through IoT platform.
Suggested Books:
• Machine Learning and IoT for Intelligent Systems and Smart Applications, Madhumathy P, M
Kumar, R. Umamaheswari, CRC Press
• IoT Fundamentals: Networking Technologies Protocols And Use Cases For The Internet Of Things,
Hanes David, Salgueiro Gonzalo, Grossetete Patrick, Barton Rob, Henry Jerome, Pearson Education;
First Edition
• IoT for Beginners: Explore IoT Architecture, Working Principles, IoT Devices, and Various Real
IoT Projects, Vibha Soni, BPB Publications
Suggested Books:
• Bioinformatics: David Mount
• Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic acids, R. Durbin, S.R.
Eddy, A. Krogh and G. Mitchison.
Suggested books:
• Speech and Language Processing (3rd Edition) DanielJurafsky and James Martin, 2019. [SLP]
• Recommender Systems Charu C. Aggarwal, Springer, 2016. [RS]
• Social Media Mining Zafarni, Abbasi and Liu, Cambridge University Press, 2014. [SMM]
UNIT 2 – Random graph models:Random graphs and alternative models, Models of network growth,
Navigation in social Networks, Cohesive subgroups, Multidimensional Scaling, Structural equivalence, roles
and positions.
Unit 3 – Network topology and diffusion, Contagion in Networks, Complex contagion, Percolation and
information, Navigation in Networks Revisited.
UNIT 4 – Small world experiments, small world models, origins of small world, Heavy tails, Small
Diameter, Clusteringof connectivity, The ErdosRenyi Model, Clustering Models.
UNIT 5 – Network structure -Important vertices and page rank algorithm, towards rational dynamics in
networks, basics of game theory, Coloring and consensus, biased voting, network formation games, network
structure and equilibrium, behavioral experiments, Spatial and agent-based models.
Suggested Books:
• S. Wasserman and K. Faust. “Social Network Analysis: Methods and Applications”, Cambridge
University Press.
• D. Easley and J. Kleinberg, “Networks, Crowds and Markets: Reasoning about a highly connected
world”, Cambridge University Press, 1st edition,2010
• Maarten van Steen. “Graph Theory and Complex Networks. An Introduction”, 2010.2)RezaZafarani,
Mohammed Ali Abbasi, Huan Liu. “Social Media Mining: An Introduction”. Cambridge University
Press 2014.
• Maksim Tsvetovat and Alexander Kouznetsov. “Social Network Analysis for Startups”. O’Reilly
Media, 2011.