ENGLISH中文版
所在位置
学院首页>>english>>Programs>>Master Programs
Master Programs

        Graduates should have a solid foundation of theory and application in the areas of cyberspace security. They are expected to be aware of the research overview and development trend of cyberspace security, meanwhile, they are required to have the ability to undertake scientific research and technical work independently. On the other hand, the ability that proficiency with the methods, technologies, tools in cyberspace security discipline and using them to solve practical problems is also necessary. The research duration for full-time students to obtain master’s degrees is 2-3 years and it provides six sub-disciplines: Fundamental of Cyberspace Security, Systems Security, Cyber-Physical Systems (CPS) Security, Network Security, Application Security and Information Content Security.

  1.     •  Fundamental of Cyberspace Security

  2.         This direction includes standards and evaluations, security architectures, game theories, information theories, security models, hierarchical protection and safety index systems, backward analysis.
  3.     •  Systems Security

  4.         This direction includes trusted computing, operating system security, wireless communication system security, equipment safety and physical environment safety, chip security, system vulnerability analysis.
  5.     •  CPS Security

  6.         This direction includes the CPS comprehensive security models, abnormal fusion analysis of information and physical data, control certification, data cloud storage and computing security, wireless communication system security and security applications in the field of smart grid and the internet of things.
  7.     •  Network Security

  8.         This direction includes telecommunication transmission network security, wireless communication network security, mobile communication network security, internet infrastructure security, network intrusion detection and protection, network system recovery, emergency response and attack forensics.
  9.     •  Application Security

  10.         This direction includes information system application security, internet of things security, industrial control safety, database security, supply chain security, trust mechanism, service security, privacy protection.
  11.     •  Information Content Security

  12.         This direction includes multimodal information acquisition and recognition, multimodal information choosing and filtering, network and transmission channel real-time blocking, content understanding and public opinion analysis, information association and intelligence analysis, information hiding.

        Main courses: Advanced graph theory, introduction to cyberspace security, principles and techniques of artificial intelligence, technology of network security, computer communication and network, information security engineering, information theory and coding, big data and deep learning, cyber-physical systems, machine learning and artificial neural networks.

版权所有:电子与信息工程学院 技术支持与维护:西安交通大学网络信息中心
 地址:陕西省西安市咸宁西路28号 邮编:710049
读取内容中,请等待...