PhD students should be proficient in the basic theory and system expertise of cyberspace security, and have a deep understanding of the development status, trends and research frontiers of the discipline. They should be familiar with one foreign language, possess good writing skills and international academic communication skills. They should also have the ability to independently conduct scientific research in the subject and related disciplines, to be proficient in the methods, techniques and tools of the cyberspace security discipline, and to be qualified for basic research, applied research, key technologies in the field of cyberspace security. The research duration for full-time students to obtain doctoral degrees is 3-6 years and it provides four sub-disciplines: Fundamental of Cyberspace Security, Cyberspace Big Data Processing and Content Security, Cyber-Physical Systems Security, and Software System Security.
This direction aims to build a multi-granularity defense system for network security based on network traffic analysis, which can realize the monitoring and forecasting simultaneously with both intrusion detection technology and active defense technology. Meanwhile, it also provides integrated solution for the problems in wireless communication and transmission security, electromagnetic space security, fast analytical and location technique of attack source, global distribution estimation and damage scale prediction of Botnet.
This direction includes intelligent network topic discovery, tracking and dynamic propagation characteristics analysis, multi-source public opinion data acquisition, topic dynamic propagation trend prediction, etc. The research results aim to provide the reliable technical solutions for monitoring the harmful information dissemination of the network and product promotion and application in military, education and environmental protection industry.
This direction includes the CPS comprehensive security model, abnormal fusion analysis of information and physical data, control certification, data cloud storage and computing security, wireless communication system security and security applications in the field of smart grid and the internet of things.
This direction is based on software system security analysis, guarantee and promotion. From the aspects of credibility measurement and evaluation, software behavior and user behavior modeling, and software dependency modeling to conduct in-depth research, then solving a series of problems and effectively improving the security and reliability of the software system.
Main courses: Digital image processing, cyber-physical systems, system optimization and scheduling, modern measuring control technology and systems, estimation and filtering, wireless network and mobile computing, network security, information security engineering, advanced communication technology, computational cognitive science and engineering, big Data and Deep Learning.