Week |
Subject |
Related Preparation |
1) |
Problem definition |
Lecturer notes |
2) |
Literature review about selected topic |
Lecturer notes |
3) |
Literature review about selected topic |
Lecturer notes |
4) |
Literature review about selected topic |
Lecturer notes |
5) |
Literature review about selected topic |
Lecturer notes |
6) |
Literature review about selected topic |
Lecturer notes |
7) |
Gathering data for selected topic |
Internet, library |
8) |
Gathering data for selected topic |
Internet, library |
9) |
Gathering data for selected topic |
Internet, library |
10) |
Gathering data for selected topic |
Internet, library |
11) |
Gathering data for selected topic |
Internet, library |
12) |
Gathering data for selected topic |
Internet, library |
13) |
Gathering data for selected topic |
Internet, library |
14) |
Constructing report |
None |
|
Program Outcomes |
Level of Contribution |
1) |
Understand and implement advanced concepts of Siber Security |
4 |
2) |
Use math, science, and modern engineering tools to formulate and solve advenced siber security problems. |
3 |
3) |
Review the literature critically pertaining to his/her research projects, and connect the earlier literature to his/her own results |
4 |
4) |
Follow, interpret and analyze scientific researches in the field of engineering and use the knowledge in his/her field of study |
4 |
5) |
Work effectively in multi-disciplinary research teams |
4 |
6) |
Acquire scientific knowledge |
5 |
7) |
Find out new methods to improve his/her knowledge. |
4 |
8) |
Effectively express his/her research ideas and findings both orally and in writing |
4 |
9) |
Defend research outcomes at seminars and conferences. |
5 |
10) |
Prepare master thesis and articles about thesis subject clearly on the basis of published documents, thesis, etc. |
5 |
11) |
Demonstrate professional and ethical responsibility. |
5 |