Courses are together with exams the building blocks for modules. Please keep in mind that information on the contents, learning outcomes and, especially examination conditions are given on the module level only – see section "Assignment to Modules" above.
additional remarks |
In information security domain, anomaly detection gains its own importance from researchers day by day. It is discovered that occasionally emerged frauds or intrusions in modern information systems have incurred significant loss when the suspicious activities were not detected or inefficiently processed. Therefore, numerous efforts have been devoted to devise effective detection methods, and then proceed to automation of anomaly identification in real time. In this practical course, we challenge students with a set of well designated learning tasks, which require the participants to understand the task scenario entirely and to design their own algorithms to identify corresponding anomalies. A competition on discovering the anomalies will be conducted based on the performance of their algorithms. |
Links |
TUMonline entry
|