Educational guide
IDENTIFYING DATA 2018_19
Subject MATHEMATICS FOR CYBERSECURITY II - DATA, NETWORK AND INTERNET MATHEMATICS Code 01733113
Study programme
1732 - MASTER UNIVERSITARIO EN INVESTIGACION EN CIBERSEGURIDAD (OL)
Descriptors Credit. Type Year Period
6 Optional Second First
Language
Castellano
Prerequisites
Department MATEMATICAS
Coordinador
TROBAJO DE LAS MATAS , MARÍA TERESA
E-mail mttrom@unileon.es
mcarv@unileon.es
Lecturers
CARRIEGOS VIEIRA , MIGUEL
TROBAJO DE LAS MATAS , MARÍA TERESA
Web http://riasc.unileon.es
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente MATEMATICAS GOMEZ PEREZ , JAVIER
Secretario MATEMATICAS MAZCUñAN NAVARRO , EVA MARIA
Vocal MATEMATICAS PISABARRO MANTECA , MARIA JESUS
Tribunal suplente
Cargo Departamento Profesor
Presidente MATEMATICAS GARCIA FERNANDEZ , ROSA MARTA
Secretario MATEMATICAS LOPEZ CABECEIRA , MONTSERRAT
Vocal MATEMATICAS SAEZ SCHWEDT , ANDRES

Competencies
Type A Code Competences Specific
  A17082
  A17095
Type B Code Competences Transversal
  B5220
  B5221
  B5222
  B5223
  B5224
  B5225
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
C2
C3
C1
C4
C5
A17082
A17095
B5220
B5221
B5222
B5223
B5224
B5225

Contents
Topic Sub-topic
Linear Algebra Data Analysis Linear Algebra Data Analysis
Spectral network theory Spectral network theory
Applications Social Networks
Cloud computing
Critical Infrastructures
Trustworthy user-controlled systems

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Portfolios/Learning folder 5 30 35
 
PBL (Problem Based Learning) 18 17 35
 
Lecture 20 25 45
 
Extended-answer tests 3 15 18
Oral tests 2 15 17
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Portfolios/Learning folder Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally
PBL (Problem Based Learning) Strategy consisting of students resolving problems and reflecting on their learning experiences, normally working collaboratively
Lecture Description of the contents of the subject

Personalized attention
 
Lecture
Portfolios/Learning folder
Oral tests
Extended-answer tests
Description
Via email or using moodle

Assessment
  Description Qualification
Portfolios/Learning folder Continuous assessment 30%
Oral tests Oral tests, where applicable. Summative assessment 20%
Extended-answer tests Written tests, where applicable. Summative assessment 20%
Others Individual tests. Summative assessment 50%
 
Other comments and second call
<p>At any given time, an explanation / clarification of the documents submitted by the student may be required. <br />Students are supposed to know and accept the Regulations on Plagiarism of the University.</p><style type="text/css">

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic D.G. Zill, W.S. Wright, Advanced Engineering Mathematics, Jones and Bartlett Publishers Series in Matehmatics, 2011 o posterior
E. Kreyszig, Advanced Engineering Mathematics, Wiley, 2011 o posterior
R. Cohen, S. Havlin, Complex Networks, Structure, Robustness and Function, Cambridge University Press, 2010
Douglas B. West, Introduction to graph theory, Prentice Hall, 2001 o posterior
Dan A Smovici, Linear Algebra Tools for Data Mining, World Scientific, 2012 o posterior

Complementary


Recommendations


Subjects that it is recommended to have taken before
MATHEMATICS FOR CYBERSECURITY I - CRYPTOGRAPHY / 01733002