Educational guide
IDENTIFYING DATA 2023_24
Subject NETWORK MODELS AND ITS APPLICATIONS IN CYBERSECURITY Code 01747019
Study programme
1746 - Máster Universitario de Investigación en Ciberseguridad (OL)
Descriptors Credit. Type Year Period
3 Optional First Second
Language
Castellano
Prerequisites
Department MATEMATICAS
Coordinador
CARRIEGOS VIEIRA , MIGUEL
E-mail mcarv@unileon.es
asuac@unileon.es
Lecturers
CARRIEGOS VIEIRA , MIGUEL
SUAREZ CORONA , ADRIANA
Web http://riasc.unileon.es
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Presidente MATEMATICAS GRANJA BARON , ANGEL
Secretario MATEMATICAS LOPEZ CABECEIRA , MONTSERRAT
Vocal MATEMATICAS PISABARRO MANTECA , MARIA JESUS
Tribunal suplente
Cargo Departamento Profesor
Presidente MATEMATICAS HERMIDA ALONSO , JOSÉ ÁNGEL
Secretario MATEMATICAS SAEZ SCHWEDT , ANDRES
Vocal MATEMATICAS FRANCISCO IRIBARREN , ARACELI DE

Competencies
Type A Code Competences Specific
  A18807
Type B Code Competences Transversal
  B5729
  B5730
  B5731
  B5732
  B5733
  B5734
  B5735
  B5736
  B5737
  B5738
  B5739
  B5740
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
A18807
B5729
B5730
B5736
B5740
C2
C3
A18807
B5736
B5740
C1
C4
A18807
B5737
C5
A18807
B5736
B5737
B5738
C1
C5
A18807
B5729
B5730
B5731
B5732
B5733
B5734
B5735
B5739

Contents
Topic Sub-topic
Linear Algebra Data Analysis Linear Algebra Data Analysis
Spectral network theory Spectral network theory

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Portfolios/Learning folder 10 30 40
 
PBL (Problem Based Learning) 10 30 40
 
Lecture 10 30 40
 
Extended-answer tests 5 10 15
Oral tests 5 10 15
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Portfolios/Learning folder Technique for learning how to compile and organize evidence that encourages the student to reflect on his or her progress and demonstrates that he or she has achieved the professional competences which enable him or her to work professionally
PBL (Problem Based Learning) Strategy consisting of students resolving problems and reflecting on their learning experiences, normally working collaboratively
Lecture Description of the contents of the subject

Personalized attention
 
Portfolios/Learning folder
Lecture
Extended-answer tests
Oral tests
Description
Via email or using moodle

Assessment
  Description Qualification
Portfolios/Learning folder Continuous assessment 30%
Extended-answer tests Written tests, where applicable. Summative assessment 20%
Oral tests Oral tests, where applicable. Summative assessment 20%
Others Individual tests. Summative assessment 50%
 
Other comments and second call
<p>At any given time, an explanation / clarification of the documents submitted by the student may be required. <br />Students are supposed to know and accept the Regulations on Plagiarism of the University.</p><style type="text/css">

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic E. Kreyszig, Advanced Engineering Mathematics, Wiley, 2011 o posterior
D.G. Zill, W.S. Wright, Advanced Engineering Mathematics, Jones and Bartlett Publishers Series in Matehmatics, 2011 o posterior
R. Cohen, S. Havlin, Complex Networks, Structure, Robustness and Function, Cambridge University Press, 2010
Douglas B. West, Introduction to graph theory, Prentice Hall, 2001 o posterior
Dan A Smovici, Linear Algebra Tools for Data Mining, World Scientific, 2012 o posterior

Complementary


Recommendations


Subjects that it is recommended to have taken before
MATHEMATICS FOR CYBERSECURITY I - CRYPTOGRAPHY / 01733002