Graduates should have a solid foundation of theory and application in the areas of cyberspace security. They are expected to be aware of the research overview and development trend of cyberspace security, meanwhile, they are required to have the ability to undertake scientific research and technical work independently. On the other hand, the ability that proficiency with the methods, technologies, tools in cyberspace security discipline and using them to solve practical problems is also necessary. The research duration for full-time students to obtain master’s degrees is 2-3 years and it provides six sub-disciplines: Fundamental of Cyberspace Security, Systems Security, Cyber-Physical Systems (CPS) Security, Network Security, Application Security and Information Content Security.
This direction includes standards and evaluations, security architectures, game theories, information theories, security models, hierarchical protection and safety index systems, backward analysis.
This direction includes trusted computing, operating system security, wireless communication system security, equipment safety and physical environment safety, chip security, system vulnerability analysis.
This direction includes the CPS comprehensive security models, abnormal fusion analysis of information and physical data, control certification, data cloud storage and computing security, wireless communication system security and security applications in the field of smart grid and the internet of things.
This direction includes telecommunication transmission network security, wireless communication network security, mobile communication network security, internet infrastructure security, network intrusion detection and protection, network system recovery, emergency response and attack forensics.
This direction includes information system application security, internet of things security, industrial control safety, database security, supply chain security, trust mechanism, service security, privacy protection.
This direction includes multimodal information acquisition and recognition, multimodal information choosing and filtering, network and transmission channel real-time blocking, content understanding and public opinion analysis, information association and intelligence analysis, information hiding.
Main courses: Advanced graph theory, introduction to cyberspace security, principles and techniques of artificial intelligence, technology of network security, computer communication and network, information security engineering, information theory and coding, big data and deep learning, cyber-physical systems, machine learning and artificial neural networks.