• Welcome to CSE Department, DIAT Courses!

    Dr. Sunita Vikrant Dhavale
    PhD ,M.E. (Computer Science Engineering)
    Assistant Professor,
    Defence Institute of Advanced Technology, Girinagar, Pune. Maharashtra, India
    email: sunitadhavale@diat.ac.in

    Dr Sunita Vikrant Dhavale received her M.E. in Computer Science from Pune University, India in 2009 and Ph.D. degrees in Computer Science from Defence Institute of Advanced Technology, Pune, India in 2015. She is presently associated with the Defence Institute of Advanced Technology, Pune, as an Assistant Professor in the Department of Computer Engineering. She is a Senior IEEE member and published several research papers in International Conferences and International Journals. She has guided more than 40 M.Tech. Students. She is the recipient of 1) NVIDIA hardware research grant (GPU TITAN V) costing approximately Rs. 3,67,000/- by NVIDIA Coorporation to support her research work in application of deep learning techniques for video based human activity detection, Dec 2018, 2) “Academic advocate membership, ISACA”, 2012, 3) “First Position in Professional Category in Essay Writing Competition, organized by IEEE Pune Section, May 2022”, 4) LSRB research project grant of Rs. 38,85,894/- for a project titled “Intelligent Video-based Human Activity Analysis”, 1.5 years duration, in association with DIPR, DRDO, 2021, 5) Best paper award for her authored paper titled “C-ASFT: Convolutional Neural Networks based Anti-Spam Filtering Technique”, presented in ICCSA-2019, 6) Most consistent and active mentor award recognition, ATL Tinkerpreneur Bootcamp, Atal Innovation Mission, Gov of India, 2021 and one of the team mentored by her received 15th ranking in top 100 entries. 7) IETE-M N Saha Memorial Award -2016, 8) ADA Bangalore research project grant of Rs. 21,00,039/- for a project titled "Prognostic Engine Health Assessment based on Borescope Images using AI Approach". She developed C3IA (CNN based Covid-19 Chest Xray Image analysis) tool for abnormal chest X-Ray detection which will aid automated quick analysis for Covid patient detection, 2020. She mentored DIAT student teams “DCSE_AVENGERS1” in 2019 and “Age_of_Ultron” in 2020 comprising six students of CSE Department who won the prestigious Smart India Hackathon grand finale in software edition in 2019 and 2020 consecutively. Her areas of interest are computer vision, deep learning, and cyber security.

    Refer for research work details: https://scholar.google.co.in/citations?user=S9vEXu0AAAAJ&hl=en.

    Refer for Teaching Courses: https://svd.gnomio.com

    Website: https://diat.ac.in/, https://rc1034bysvd.wordpress.com/about/

    Research Domains:

    • Cyber Security, Application of Deep/Machine Learning for data analytics

    Specific Projects:

    • Product Developed: C3IA (CNN based Covid-19 Chest X-ray Image analysis) tool for abnormal chest X-Ray detection which will aid automated quick analysis for Covid patient detection.
    • LSRB research project grant of Rs. 38,85,894/- for a project entitled “ Intelligent Video-based Human Activity Analysis”, 1.5 years duration, In association with DIPR, DRDO, 2021
    • Project titled " Prognostic Engine Health Assessment based on Borescope Images using AI Approach" Funded by ADA, Bangalore, 30/03/2023-29/03/2024, duration: 1 year. Project grant of Rs. 21,00,039/-.

    Research Collaborations:

    DIPR, R&DE, ARDE, INMAS, UWE UK

    Research Datasets Made available: Those who are interested to get educational access to DIAT-µRadHAR dataset, please send an e-mail request to “sunitadhavale@diat.ac.in” mentioning the subject: “DIAT-µRadHAR Dataset Educational Access Request” from their institutional e-mail id. 

    DIAT-μRadHAR: Radar micro-Doppler Signature Dataset for Human Activity Recognition Using Deep Learning Architectures. The dataset consists of the following human activity classes;

    DIAT-µRadHAR dataset

    Publications:




    ####################################################################################################
    You are welcome to use the Open Educational Resources (OER) offered by us. Select any course from following list of courses.

    These courses are Open Educational Resources developed in moodle website https://svd.gnomio.com.

    All the resources on this website are licensed under CC-BY-SA ver 4.0. You are free to use, distribute and modify it, including for commercial purposes, provided you acknowledge the source and share-alike. To see more details about the license visit http://creativecommons.org/licenses/by-sa/4.0/

    Creative Commons License


Available courses

Course Objectives:

This course examines the methods for securing information existing in different forms. This course will provide an introduction to the different technical and administrative aspects of Information Security and Assurance. Also, one cannot protect his information assets if he doesn’t know how attackers think and what techniques attackers use to exploit systems. Hence, learning offensive security techniques like Ethical Hacking and penetration testing is becoming a need of future cyber security world. Objectives are: 1. To facilitate individual in gaining knowledge on information security management systems,.2. To facilitate individual in gaining knowledge on security standards like ISO-27001 standards, TCSEC, ITSEC, Secure coding etc. 3. To train individual to become competent information security professional by learning both theoretical as well as practical ethical hacking and penetration testing knowledge base.

Prerequisites: Basic computer networking, operating systems and computer programming knowledge is required.

Unit 1: Introduction to Information security, Concepts, Threats, Attacks, and Assets, Security Functional Requirements, Countermeasures , Access Control Principles, Access Rights , Discretionary Access Control, Role - Based Access Control, Mandatory Access Control , Trusted Computing and Multilevel Security, Security Design Principles, Cryptographic Tools, Common Criteria for Information Technology Security Evaluation, Information security management systems (ISMS), ISO27000 and other security standards, Management responsibility, Responsibilities of Chief Information Security Officer (CISO)

Unit 2: Security audits and assurance, Information Security Policy, Standards, and Practices, Asset Management, Human Resource Security, Security awareness training, Physical Security, Risk Management, Business continuity planning, Disaster Recovery planning, Penetration Testing Methodologies Security Assessments, Penetration Testing Methodologies, Penetration Testing Steps, Setting up own virtual ethical hacking lab for experimentation, Ethical Hacking and penetration Basics - Hacking terminology & attacks, Ethics, Legality.

Unit 3: Phases - Reconnaissance, Scanning,Gaining access, Maintaining access, Covering tracks; Reconnaissance - Information gathering,Vulnerability research, Foot -printing, whois, DNS enumeration, Social Engineering, E - Mail Tracking,Web Spiders; Scanning & Enumeration - Sniffing techniques & tools, arp/icmp/tcp/ip host discovery, types of Scanning , Ping Sweep Techniques, Nmap, Command Switches, SYN, Stealth, XMAS, NULL, IDLE, and FIN Scansdetecting OS fingerprinting, banner grabbing, Null Sessions, SNMP/DHCP/DNS enumeration, Proxy Servers, Anonymizers, HTTP Tunneling Techniques, IP Spoofing Techniques; Cryptographic Techniques

Unit 4: Attacking System and Maintaining Access– Password/hashcracking, NetBIOS DoS Attacks, PasswordCracking Countermeasures; escalating privileges - exploiting vulnerabilities, Buffer Overflows,Rootkits, Hiding FilesNTFS Stream Countermeasures, Steganography Technologies, Cover tracks and Erase Evidence, Disabling Auditing, Clearing the event Log, Malware attacks-Trojan, Backdoor, Viruses, Worms, DoS/DDoS; Attacks, Windows Hacking; Linux Hacking; Web and Database Hacking; Google Hacking; Wireless Hacking; Mobile Hacking; Penetration Testing Tools like Kali Linux, Metasploit ,Pen-Test Deliverables

Text Book:

1. Michael E Whitman, Herbert J Mattord, “Principles of Information Security”, Course Technology, 3rd Edition, 2008.

2. Dhavale, S. V. (2019). Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (pp. 1-305). Hershey, PA: IGI Global.

3. Stuart McClure, Joel Scambray, George Kurtz, “Hacking Exposed:n/w sec secrets and solutions”, Mcgraw Hill, 2012

Reference Books:

1. Various Security Standards - ISO 27000 series published by ISO.

2. Department of Defense Standard, Department of Defense, “Trusted Computer System Evaluation Criteria”, Orange Book.

3. Dieter Gollmann, “Computer Security”, John Wiley and Sons, Inc., 3rd edition, 2011

 4. David Kennedy, Jim O’Gorman, Devon Kearns, and MatiAharoni, ”Metasploitpentest guide”,No starch Press, san Francisco, 2011

5. Bastian ballman, “Understanding n/w hacks:attack and defense with python”, Springer,2012

6. Rich Annings, HimanshuDwivedi, Zane Lackey, ”Hacking Exponsed Web 2.0”, Tata Mcgraw hill Edition

7. Research paper for study (if any) - White papers on multimedia from IEEE/ACM/Elsevier/Spinger/IBM/EC-Council sources

8. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 2nd edition, Pearson, 2012.

9. Krutz, R. L. & Vines, R. D., “The CISSP and CAP Prep Guide”, Platinum Edition, New York, Wiley Publishing., 2006.

10. Nina Godbole, “Information Systems Security: Security Management, Metrics, Frameworks and Best Practices”, Wiley India Pvt Ltd, 2012.

Course Objectives:

To provide the knowledge of programming language as it applies to data analytics. Skills will be developed for Data Analysis with Python/other programming language to develop product. Student will learn various ML techniques including Supervised, unsupervised classification and regression analysis, Artificial Neural Networks, etc. Student will learn Python Programming for implementing these algorithms on standard datasets

Syllabus:

Unit I: Data Analytics Foundations: R programming, Python Basics -Expressions and Variables, String Operations, Lists and Tuples, Sets, Dictionaries Conditions and Branching, Loops, Functions, Objects and Classes, Reading/Writing files, Hand ling data with Pandas, Scikit Library, Numpy Library, Matplotlib, scikit programming for data analysis, setting up lab environment, study of standard datasets. Introduction to Machine Learning- Applications of Machine Learning, Supervised, unsupervised classification and regression analysis.

Unit II: Python libraries suitable for Machine Learning Feature Extraction. Data pre-processing, feature analysis etc., Dimensionality Reduction & Feature Selection Methods, Linear Discriminant Analysis and Principal Component Analysis, tackle data class imbalance problem 

Unit III: Supervised and regression analysis, Regression, Linear Regression, Non-linear Regression, Model evaluation methods, Classification, K-Nearest Neighbor, Naïve Bayes, Decision Trees, Logistic Regression, Support Vector Machines, Artificial Neural Networks, Model Evaluation.

Unit IV: Unsupervised classification K-Means Clustering, Hierarchical Clustering, Density-Based Clustering, Recommender Systems- Content-based recommender systems, Collaborative Filtering, machine learning techniques for standard dataset, ML applications, Case Study: Image spam detection

Text Book: 

1. Building Machine Learning Systems with Python - Willi Richert, Luis Pedro Coelho

2. Learning scikit-learn: Machine Learning in Python - Raúl Garreta, Guillermo Moncecchi

3. Machine Learning: An Algorithmic Perspective - Stephen Marsland

4. Sunita Vikrant Dhavale, “Advanced Image-based Spam Detection and Filtering Techniques”, IGI Global, 2017

5. Trevor Hastie, Robert Tibshirani, Jerome Friedman - The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Second Edition. February 2009

Reference Books:

1. Stuart Russell, Peter Norvig (2009), “Artificial Intelligence – A Modern Approach”, Pearson Elaine Rich & Kevin Knight (1999), “Artificial Intelligence”, TMH, 2nd Edition

2. NP Padhy (2010), “Artificial Intelligence & Intelligent System”, Oxford

3. ZM Zurada (1992), “Introduction to Artificial Neural Systems”, West Publishing Company

4. Research paper for study (if any) - White papers on multimedia from IEEE/ACM/Elsevier/Spinger/ NVidia sources.

This course is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune.

For lab sessions, you need laptop with atleast 8 GB memory with windows7 operating system. You also need to install Anaconda, R Tool and R Studio software in order to carry out lab assignments.


Computer Vision (CE-632) Course is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune. As a countermeasure against corona outbreak, we are adopting online lecture facility for this subject during period of precautions stated by government. This course examines the tools and techniques required for learning computer vision framework. This course will provide an introduction to the subject and its various applications. Student will learn to implement different CV algorithms for solving various problems.

Prerequisites: Basics of image processing/computer programming/Statistical Techniques knowledge are required.

Note: DIAT postgraduate students and Research scholars from Artificial Intelligence specialization can attend this Lab. You need laptop with at least 6 GB memory with windows 7 operating system. You also need to install anaconda-spyder-python framework in order to carry out mentioned lab assignments.

Syllabus:

UNIT I IMAGE PROCESSING FOUNDATIONS: Review of image processing techniques – classical filtering operations – thresholding techniques – edge detection techniques – corner and interest point detection – mathematical morphology – texture

UNIT II SHAPES AND REGIONS: Binary shape analysis – connectedness – object labeling and counting – size filtering – distance functions – skeletons and thinning – deformable shape analysis – boundary tracking procedures – active contours – shape models and shape recognition – centroidal profiles – handling occlusion – boundary length measures – boundary descriptors – chain codes – Fourier descriptors – region descriptors – moments

UNIT III HOUGH TRANSFORM: Line detection – Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT based circular object detection – accurate center location – speed problem – ellipse detection – Case study: Human Iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for feature collation

UNIT IV APPLICATIONS: Application: Face detection – Face recognition – Eigen faces – Application: Surveillance – foreground-background separation – particle filters – Chamfer matching, tracking, and occlusion – combining views from multiple cameras – human gait analysis Application: In-vehicle vision system: locating roadway – road markings – identifying road signs – locating pedestrians

 Text/Reference Books:

  • 1. E. R. Davies, “Computer & Machine Vision”, Fourth Edition, Academic Press, 2012.
  • 2. R. Szeliski, “Computer Vision: Algorithms and Applications”, Springer 2011.
  • 3. Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge University Press, 2012.
  • 4. Mark Nixon and Alberto S. Aquado, “Feature Extraction & Image Processing for Computer Vision”, Third Edition, Academic Press, 2012.
  • 5. D. L. Baggio et al., “Mastering OpenCV with Practical Computer Vision Projects”, Packt Publishing, 2012.
  • 6. Jan Erik Solem, “Programming Computer Vision with Python: Tools and algorithms for analyzing images”, O'Reilly Media, 2012.


Course Objectives:

This course examines the methods for securing information existing in different forms. This course will provide an introduction to the different technical and administrative aspects of Information Security and Assurance. Also, one cannot protect his information assets if he doesn’t know how attackers think and what techniques attackers use to exploit systems. Hence, learning offensive security techniques like Ethical Hacking and penetration testing is becoming a need of future cyber security world. Objectives are: 1. To facilitate individual in gaining knowledge on information security management systems,.2. To facilitate individual in gaining knowledge on security standards like ISO-27001 standards, TCSEC, ITSEC, Secure coding etc. 3. To train individual to become competent information security professional by learning both theoretical as well as practical ethical hacking and penetration testing knowledge base.

Prerequisites: Basic computer networking, operating systems and computer programming knowledge is required.

Unit 1: Introduction to Information security, Concepts, Threats, Attacks, and Assets, Security Functional Requirements, Countermeasures , Access Control Principles, Access Rights , Discretionary Access Control, Role - Based Access Control, Mandatory Access Control , Trusted Computing and Multilevel Security, Security Design Principles, Cryptographic Tools, Common Criteria for Information Technology Security Evaluation, Information security management systems (ISMS), ISO27000 and other security standards, Management responsibility, Responsibilities of Chief Information Security Officer (CISO)

Unit 2: Security audits and assurance, Information Security Policy, Standards, and Practices, Asset Management, Human Resource Security, Security awareness training, Physical Security, Risk Management, Business continuity planning, Disaster Recovery planning, Penetration Testing Methodologies Security Assessments, Penetration Testing Methodologies, Penetration Testing Steps, Setting up own virtual ethical hacking lab for experimentation, Ethical Hacking and penetration Basics - Hacking terminology & attacks, Ethics, Legality.

Unit 3: Phases - Reconnaissance, Scanning,Gaining access, Maintaining access, Covering tracks; Reconnaissance - Information gathering,Vulnerability research, Foot -printing, whois, DNS enumeration, Social Engineering, E - Mail Tracking,Web Spiders; Scanning & Enumeration - Sniffing techniques & tools, arp/icmp/tcp/ip host discovery, types of Scanning , Ping Sweep Techniques, Nmap, Command Switches, SYN, Stealth, XMAS, NULL, IDLE, and FIN Scansdetecting OS fingerprinting, banner grabbing, Null Sessions, SNMP/DHCP/DNS enumeration, Proxy Servers, Anonymizers, HTTP Tunneling Techniques, IP Spoofing Techniques; Cryptographic Techniques

Unit 4: Attacking System and Maintaining Access– Password/hashcracking, NetBIOS DoS Attacks, PasswordCracking Countermeasures; escalating privileges - exploiting vulnerabilities, Buffer Overflows,Rootkits, Hiding FilesNTFS Stream Countermeasures, Steganography Technologies, Cover tracks and Erase Evidence, Disabling Auditing, Clearing the event Log, Malware attacks-Trojan, Backdoor, Viruses, Worms, DoS/DDoS; Attacks, Windows Hacking; Linux Hacking; Web and Database Hacking; Google Hacking; Wireless Hacking; Mobile Hacking; Penetration Testing Tools like Kali Linux, Metasploit ,Pen-Test Deliverables

Text Book:

1. Michael E Whitman, Herbert J Mattord, “Principles of Information Security”, Course Technology, 3rd Edition, 2008.

2. Dhavale, S. V. (2019). Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (pp. 1-305). Hershey, PA: IGI Global.

3. Stuart McClure, Joel Scambray, George Kurtz, “Hacking Exposed:n/w sec secrets and solutions”, Mcgraw Hill, 2012

Reference Books:

1. Various Security Standards - ISO 27000 series published by ISO.

2. Department of Defense Standard, Department of Defense, “Trusted Computer System Evaluation Criteria”, Orange Book.

3. Dieter Gollmann, “Computer Security”, John Wiley and Sons, Inc., 3rd edition, 2011

 4. David Kennedy, Jim O’Gorman, Devon Kearns, and MatiAharoni, ”Metasploitpentest guide”,No starch Press, san Francisco, 2011

5. Bastian ballman, “Understanding n/w hacks:attack and defense with python”, Springer,2012

6. Rich Annings, HimanshuDwivedi, Zane Lackey, ”Hacking Exponsed Web 2.0”, Tata Mcgraw hill Edition

7. Research paper for study (if any) - White papers on multimedia from IEEE/ACM/Elsevier/Spinger/IBM/EC-Council sources

8. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 2nd edition, Pearson, 2012.

9. Krutz, R. L. & Vines, R. D., “The CISSP and CAP Prep Guide”, Platinum Edition, New York, Wiley Publishing., 2006.

10. Nina Godbole, “Information Systems Security: Security Management, Metrics, Frameworks and Best Practices”, Wiley India Pvt Ltd, 2012.

Course Objectives:

To provide the knowledge of programming language as it applies to data analytics. Skills will be developed for Data Analysis with Python/other programming language to develop product. Student will learn various ML techniques including Supervised, unsupervised classification and regression analysis, Artificial Neural Networks, etc. Student will learn Python Programming for implementing these algorithms on standard datasets

Syllabus:

Unit I: Data Analytics Foundations: R programming, Python Basics -Expressions and Variables, String Operations, Lists and Tuples, Sets, Dictionaries Conditions and Branching, Loops, Functions, Objects and Classes, Reading/Writing files, Hand ling data with Pandas, Scikit Library, Numpy Library, Matplotlib, scikit programming for data analysis, setting up lab environment, study of standard datasets. Introduction to Machine Learning- Applications of Machine Learning, Supervised, unsupervised classification and regression analysis.

Unit II: Python libraries suitable for Machine Learning Feature Extraction. Data pre-processing, feature analysis etc., Dimensionality Reduction & Feature Selection Methods, Linear Discriminant Analysis and Principal Component Analysis, tackle data class imbalance problem 

Unit III: Supervised and regression analysis, Regression, Linear Regression, Non-linear Regression, Model evaluation methods, Classification, K-Nearest Neighbor, Naïve Bayes, Decision Trees, Logistic Regression, Support Vector Machines, Artificial Neural Networks, Model Evaluation.

Unit IV: Unsupervised classification K-Means Clustering, Hierarchical Clustering, Density-Based Clustering, Recommender Systems- Content-based recommender systems, Collaborative Filtering, machine learning techniques for standard dataset, ML applications, Case Study: Image spam detection

Text Book: 

1. Building Machine Learning Systems with Python - Willi Richert, Luis Pedro Coelho

2. Learning scikit-learn: Machine Learning in Python - Raúl Garreta, Guillermo Moncecchi

3. Machine Learning: An Algorithmic Perspective - Stephen Marsland

4. Sunita Vikrant Dhavale, “Advanced Image-based Spam Detection and Filtering Techniques”, IGI Global, 2017

5. Trevor Hastie, Robert Tibshirani, Jerome Friedman - The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Second Edition. February 2009

Reference Books:

1. Stuart Russell, Peter Norvig (2009), “Artificial Intelligence – A Modern Approach”, Pearson Elaine Rich & Kevin Knight (1999), “Artificial Intelligence”, TMH, 2nd Edition

2. NP Padhy (2010), “Artificial Intelligence & Intelligent System”, Oxford

3. ZM Zurada (1992), “Introduction to Artificial Neural Systems”, West Publishing Company

4. Research paper for study (if any) - White papers on multimedia from IEEE/ACM/Elsevier/Spinger/ NVidia sources.

This course is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune.

For lab sessions, you need laptop with atleast 8 GB memory with windows7 operating system. You also need to install Anaconda, R Tool and R Studio software in order to carry out lab assignments.


Computer Vision (CE-632) Course is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune. As a countermeasure against corona outbreak, we are adopting online lecture facility for this subject during period of precautions stated by government. This course examines the tools and techniques required for learning computer vision framework. This course will provide an introduction to the subject and its various applications. Student will learn to implement different CV algorithms for solving various problems.

Prerequisites: Basics of image processing/computer programming/Statistical Techniques knowledge are required.

Note: DIAT postgraduate students and Research scholars from Artificial Intelligence specialization can attend this Lab. You need laptop with at least 6 GB memory with windows 7 operating system. You also need to install anaconda-spyder-python framework in order to carry out mentioned lab assignments.

Syllabus:

UNIT I IMAGE PROCESSING FOUNDATIONS: Review of image processing techniques – classical filtering operations – thresholding techniques – edge detection techniques – corner and interest point detection – mathematical morphology – texture

UNIT II SHAPES AND REGIONS: Binary shape analysis – connectedness – object labeling and counting – size filtering – distance functions – skeletons and thinning – deformable shape analysis – boundary tracking procedures – active contours – shape models and shape recognition – centroidal profiles – handling occlusion – boundary length measures – boundary descriptors – chain codes – Fourier descriptors – region descriptors – moments

UNIT III HOUGH TRANSFORM: Line detection – Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT based circular object detection – accurate center location – speed problem – ellipse detection – Case study: Human Iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for feature collation

UNIT IV APPLICATIONS: Application: Face detection – Face recognition – Eigen faces – Application: Surveillance – foreground-background separation – particle filters – Chamfer matching, tracking, and occlusion – combining views from multiple cameras – human gait analysis Application: In-vehicle vision system: locating roadway – road markings – identifying road signs – locating pedestrians

 Text/Reference Books:

  • 1. E. R. Davies, “Computer & Machine Vision”, Fourth Edition, Academic Press, 2012.
  • 2. R. Szeliski, “Computer Vision: Algorithms and Applications”, Springer 2011.
  • 3. Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge University Press, 2012.
  • 4. Mark Nixon and Alberto S. Aquado, “Feature Extraction & Image Processing for Computer Vision”, Third Edition, Academic Press, 2012.
  • 5. D. L. Baggio et al., “Mastering OpenCV with Practical Computer Vision Projects”, Packt Publishing, 2012.
  • 6. Jan Erik Solem, “Programming Computer Vision with Python: Tools and algorithms for analyzing images”, O'Reilly Media, 2012.


Ethical Hacking and Penetration Testing (EHPT) Course is part of MTech (Cyber Security) Program run by CSE Department, DIAT, Pune. As a countermeasure against corona outbreak, we are adopting online lecture facility for this subject during period of precautions stated by government. This course is of 40 weeks containing total 20 LAB practicals/assignments, which demonstrates various hacking attacks along with supported lecture slides.

EHPT usually refers to finding out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. Thus EHPT improves the security of the network or systems by fixing the vulnerabilities found during testing. The same attacking methods and hacking tools used by the malicious hackers are used in EHPT but with the permission of the authorized person for the purpose of improving the security.

The objective of this course is to introduce different attacks and possible countermeasures. These penetration testing methods are demonstrated step wise so that any one can learn them easily. The course will help the students to carry out the practical hands on activities in EHPT.

DIAT postgraduate students and Research scholars from cyber security specialization can attend this Lab. You need laptop with atleast 4 GB memory with windows 7 operating system. You also need to Oracle Virtual Box/VMware, Kali Linux Operating System VM, windows VM, wireshark tools and many more as will be discussed subsequently in the course in order to carry out mentioned lab assignments.



Ethical Hacking and Penetration Testing (EHPT) Course is part of MTech (Cyber Security) Program run by CSE Department, DIAT, Pune. As a countermeasure against corona outbreak, we are adopting online lecture facility for this subject during period of precautions stated by government. This course is of 40 weeks containing total 20 LAB practicals/assignments, which demonstrates various hacking attacks along with supported lecture slides.

EHPT usually refers to finding out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. Thus EHPT improves the security of the network or systems by fixing the vulnerabilities found during testing. The same attacking methods and hacking tools used by the malicious hackers are used in EHPT but with the permission of the authorized person for the purpose of improving the security.

The objective of this course is to introduce different attacks and possible countermeasures. These penetration testing methods are demonstrated step wise so that any one can learn them easily. The course will help the students to carry out the practical hands on activities in EHPT.

DIAT postgraduate students and Research scholars from cyber security specialization can attend this Lab. You need laptop with atleast 4 GB memory with windows 7 operating system. You also need to Oracle Virtual Box/VMware, Kali Linux Operating System VM, windows VM, wireshark tools and many more as will be discussed subsequently in the course in order to carry out mentioned lab assignments.



Computational Intelligence (CI) usually refers to the ability of a computer to learn a specific task from data or experimental observation. CI consists of nature-inspired computational methodologies and approaches like Fuzzy logic, Neural Networks, Evolutionary Computing, Support vector machines, and Probabilistic Methods to address complex real-world problems, where traditional mathematical modeling fails. CI covers a wide range of applications from classification, pattern recognition and system modeling, to intelligent control systems.

Syllabus:

Unit I: Introduction to Computational Intelligence: Computational Intelligence Paradigms, Artificial Neural Networks, Evolutionary Computation, Swarm Intelligence, Artificial Immune Systems, Fuzzy Systems, Supervised, unsupervised classification and regression analysis.

Unit II: Dimensionality Reduction & Feature Selection Methods: Linear Discriminant Analysis and Principal Component Analysis; Data Pre-Processing, Regression, Universal Approximation 

Unit III: Evolutionary Computation: An Overview of Combinatorial Optimization, An Introduction to Genetic Algorithms, Theoretical Foundations of Genetic Algorithms, Genetic Algorithms in Engineering and Optimization, Genetic Algorithms in Natural Evolution,

Unit IV: Swarm Intelligence: Particle Swarm Optimization, Ant Colony Optimization.

Unit IV: Nature Inspired Algorithms for optimization: Differential Evolution, Simulated Annealing, Multi-objective Optimization, Hybrid Optimization Algorithms

Text Book: 

1. Eberhart& Shi, “Computational Intelligence: Concepts to Implementations”, Morgan Kaufmann, 2007

2. Xin-She Yang, “Nature Inspired Optimization Algorithms”, Elsevier, 2014

Reference Books:

3. AndriesEngelbrecht (2007), “Computational Intelligence: an Introduction”, Wiley

4. Amit Konar (2005), “Computational Intelligence: Principles, Techniques, and Applications”, Springer-Verlag Berlin Heidelberg

5. Stuart Russell, Peter Norvig (2009), “Artificial Intelligence – A Modern Approach”, Pearson

6. Elaine Rich & Kevin Knight (1999), “Artificial Intelligence”, TMH, 2nd Edition

7. NP Padhy (2010), “Artificial Intelligence & Intelligent System”, Oxford

8. ZM Zurada (1992), “Introduction to Artificial Neural Systems”, West Publishing Company

9. Timothy J Ross (2004), “Fuzzy Logic with Engineering Applications”, John Wiley & Sons Ltd.

Computational Intelligence (CI) LAB is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune. This Lab course is of 3 weeks containing total 10 LAB practicals/assignments, which covers introduction to R Programming and application of R Tool for learning CIS concepts. 

The objective of this LAB is to introduce R Tool, an open source statistical computing environment which can be further used to study various computational intelligent algorithms discussed in subsequent CI labs. This lab will help familiarize you with the R software, including how to access data files, how to define variables, to analyze/process/store data etc.

DIAT postgraduate students and Research scholars can attend this Lab. Note: This lab on Computational Intelligent Systems is to be used as a supplement to a parallel course on the same topic with course code CE-604. It is not designed to be a complete course/tutorial by itself where a student can learn the concepts of CI just by going through these video based designed experiments.

You need laptop with atleast 2 GB memory with windows7 operating system. You also need to install R Tool and R Studio software in order to carry out mentioned lab assignments.

The course will help the students to carry out the research work in different CIS, machine learning applications like classification, regression or clustering tasks etc.


Course Objectives:

This course examines the methods for securing information existing in different forms. This course will provide an introduction to the different technical and administrative aspects of Information Security and Assurance. Student will learn various countermeasures/tools/mechanisms/best practices used for implementing and managing information security. Students will also learn to design, implement, integrate and manage various security infrastructure components through hands-on activities in Information Security Laboratory. The course will facilitate individual in gaining knowledge on information security management systems, security standards like ISO-27001 standards, TCSEC, ITSEC, and Secure coding.

 Prerequisites: Basic computer networking, operating systems and computer programming knowledge is required.

 Syllabus:

Introduction to Information security, Concepts, Threats, Attacks, and Assets, Security Functional Requirements, A Security Architecture for Open Systems, Computer Security, Access Control Principles, Access Rights, Discretionary Access Control, Role-Based Access Control, Mandatory Access Control, Trusted Computing and Multilevel Security, Security Models for Computer Security, Countermeasures, Cryptographic Tools, Database Security, Intrusion Detection and Intrusion Prevention Systems, Software Security, Operating System Security, Digital rights management, Identity Management, privacy protection, Information Assurance, pillar of information assurance, Defense-In-Depth strategy , Orange Book, Common Criteria for Information Technology Security Evaluation, COMSEC policies, Information security management systems (ISMS), ISO27000 standards, Management responsibility, Responsibilities of Chief Information Security Officer (CISO), Security audits and assurance, Information Security Policy, Standards, and Practices, Asset Management, Human Resource Security, Security awareness training, Physical Security, Operations Security, Incident Response Management, Risk Management, contingency planning, Business continuity planning, Disaster Recovery planning.

 Text Book:

1. Michael E Whitman, Herbert J Mattord, “Principles of Information Security”, Course Technology, 3rd Edition, 2008.

2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 2nd edition, Pearson, 2012.

3. Krutz, R. L. & Vines, R. D., “The CISSP and CAP Prep Guide”, Platinum Edition, New York, Wiley Publishing., 2006.

4. Nina Godbole, “InformationSystems Security: Security Management, Metrics, Frameworks and Best Practices”, Wiley India Pvt Ltd, 2012.

Reference Books:

1. Various Security Standards - ISO 27000 series published by ISO.

2. Department of Defense Standard, Department of Defense, “Trusted Computer System Evaluation Criteria”, Orange Book.

3. Dieter Gollmann, “Computer Security”, John Wiley and Sons, Inc., 3rd edition, 2011

4. Dhavale, S. V. (2019). Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (pp. 1-305). Hershey, PA: IGI Global.

Research paper for study (if any) - White papers on information security assurance from IEEE/ACM/IBM sources. Important website for reference & Study (if any) - ISACA website.


Computer Vision (CE-632) Course is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune. As a countermeasure against corona outbreak, we are adopting online lecture facility for this subject during period of precautions stated by government. This course examines the tools and techniques required for learning computer vision framework. This course will provide an introduction to the subject and its various applications. Student will learn to implement different CV algorithms for solving various problems.

Prerequisites: Basics of image processing/computer programming/Statistical Techniques knowledge are required.

Note: DIAT postgraduate students and Research scholars from Artificial Intelligence specialization can attend this Lab. You need laptop with at least 6 GB memory with windows 7 operating system. You also need to install anaconda-spyder-python framework in order to carry out mentioned lab assignments.

Syllabus:

UNIT I IMAGE PROCESSING FOUNDATIONS: Review of image processing techniques – classical filtering operations – thresholding techniques – edge detection techniques – corner and interest point detection – mathematical morphology – texture

UNIT II SHAPES AND REGIONS: Binary shape analysis – connectedness – object labeling and counting – size filtering – distance functions – skeletons and thinning – deformable shape analysis – boundary tracking procedures – active contours – shape models and shape recognition – centroidal profiles – handling occlusion – boundary length measures – boundary descriptors – chain codes – Fourier descriptors – region descriptors – moments

UNIT III HOUGH TRANSFORM: Line detection – Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT based circular object detection – accurate center location – speed problem – ellipse detection – Case study: Human Iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for feature collation

UNIT IV APPLICATIONS: Application: Face detection – Face recognition – Eigen faces – Application: Surveillance – foreground-background separation – particle filters – Chamfer matching, tracking, and occlusion – combining views from multiple cameras – human gait analysis Application: In-vehicle vision system: locating roadway – road markings – identifying road signs – locating pedestrians

 Text/Reference Books:

  • 1. E. R. Davies, “Computer & Machine Vision”, Fourth Edition, Academic Press, 2012.
  • 2. R. Szeliski, “Computer Vision: Algorithms and Applications”, Springer 2011.
  • 3. Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge University Press, 2012.
  • 4. Mark Nixon and Alberto S. Aquado, “Feature Extraction & Image Processing for Computer Vision”, Third Edition, Academic Press, 2012.
  • 5. D. L. Baggio et al., “Mastering OpenCV with Practical Computer Vision Projects”, Packt Publishing, 2012.
  • 6. Jan Erik Solem, “Programming Computer Vision with Python: Tools and algorithms for analyzing images”, O'Reilly Media, 2012.


Course Objectives:

This course examines the methods for securing information existing in different forms. This course will provide an introduction to the different technical and administrative aspects of Information Security and Assurance. Student will learn various countermeasures/tools/mechanisms/best practices used for implementing and managing information security. Students will also learn to design, implement, integrate and manage various security infrastructure components through hands-on activities in Information Security Laboratory. The course will facilitate individual in gaining knowledge on information security management systems, security standards like ISO-27001 standards, TCSEC, ITSEC, and Secure coding.

 Prerequisites: Basic computer networking, operating systems and computer programming knowledge is required.

 Syllabus:

Introduction to Information security, Concepts, Threats, Attacks, and Assets, Security Functional Requirements, A Security Architecture for Open Systems, Computer Security, Access Control Principles, Access Rights, Discretionary Access Control, Role-Based Access Control, Mandatory Access Control, Trusted Computing and Multilevel Security, Security Models for Computer Security, Countermeasures, Cryptographic Tools, Database Security, Intrusion Detection and Intrusion Prevention Systems, Software Security, Operating System Security, Digital rights management, Identity Management, privacy protection, Information Assurance, pillar of information assurance, Defense-In-Depth strategy , Orange Book, Common Criteria for Information Technology Security Evaluation, COMSEC policies, Information security management systems (ISMS), ISO27000 standards, Management responsibility, Responsibilities of Chief Information Security Officer (CISO), Security audits and assurance, Information Security Policy, Standards, and Practices, Asset Management, Human Resource Security, Security awareness training, Physical Security, Operations Security, Incident Response Management, Risk Management, contingency planning, Business continuity planning, Disaster Recovery planning.

 Text Book:

1. Michael E Whitman, Herbert J Mattord, “Principles of Information Security”, Course Technology, 3rd Edition, 2008.

2. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice”, 2nd edition, Pearson, 2012.

3. Krutz, R. L. & Vines, R. D., “The CISSP and CAP Prep Guide”, Platinum Edition, New York, Wiley Publishing., 2006.

4. Nina Godbole, “InformationSystems Security: Security Management, Metrics, Frameworks and Best Practices”, Wiley India Pvt Ltd, 2012.

Reference Books:

1. Various Security Standards - ISO 27000 series published by ISO.

2. Department of Defense Standard, Department of Defense, “Trusted Computer System Evaluation Criteria”, Orange Book.

3. Dieter Gollmann, “Computer Security”, John Wiley and Sons, Inc., 3rd edition, 2011

4. Dhavale, S. V. (2019). Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (pp. 1-305). Hershey, PA: IGI Global.

Research paper for study (if any) - White papers on information security assurance from IEEE/ACM/IBM sources. Important website for reference & Study (if any) - ISACA website.


Computational Intelligence (CI) usually refers to the ability of a computer to learn a specific task from data or experimental observation. CI consists of nature-inspired computational methodologies and approaches like Fuzzy logic, Neural Networks, Evolutionary Computing, Support vector machines, and Probabilistic Methods to address complex real-world problems, where traditional mathematical modeling fails. CI covers a wide range of applications from classification, pattern recognition and system modeling, to intelligent control systems.

Syllabus:

Unit I: Introduction to Computational Intelligence: Computational Intelligence Paradigms, Artificial Neural Networks, Evolutionary Computation, Swarm Intelligence, Artificial Immune Systems, Fuzzy Systems, Supervised, unsupervised classification and regression analysis.

Unit II: Dimensionality Reduction & Feature Selection Methods: Linear Discriminant Analysis and Principal Component Analysis; Data Pre-Processing, Regression, Universal Approximation 

Unit III: Evolutionary Computation: An Overview of Combinatorial Optimization, An Introduction to Genetic Algorithms, Theoretical Foundations of Genetic Algorithms, Genetic Algorithms in Engineering and Optimization, Genetic Algorithms in Natural Evolution,

Unit IV: Swarm Intelligence: Particle Swarm Optimization, Ant Colony Optimization.

Unit IV: Nature Inspired Algorithms for optimization: Differential Evolution, Simulated Annealing, Multi-objective Optimization, Hybrid Optimization Algorithms

Text Book: 

1. Eberhart& Shi, “Computational Intelligence: Concepts to Implementations”, Morgan Kaufmann, 2007

2. Xin-She Yang, “Nature Inspired Optimization Algorithms”, Elsevier, 2014

Reference Books:

3. AndriesEngelbrecht (2007), “Computational Intelligence: an Introduction”, Wiley

4. Amit Konar (2005), “Computational Intelligence: Principles, Techniques, and Applications”, Springer-Verlag Berlin Heidelberg

5. Stuart Russell, Peter Norvig (2009), “Artificial Intelligence – A Modern Approach”, Pearson

6. Elaine Rich & Kevin Knight (1999), “Artificial Intelligence”, TMH, 2nd Edition

7. NP Padhy (2010), “Artificial Intelligence & Intelligent System”, Oxford

8. ZM Zurada (1992), “Introduction to Artificial Neural Systems”, West Publishing Company

9. Timothy J Ross (2004), “Fuzzy Logic with Engineering Applications”, John Wiley & Sons Ltd.

Computational Intelligence (CI) LAB is part of MTech (Artificial Intelligence) Program run by CSE Department, DIAT, Pune. This Lab course is of 3 weeks containing total 10 LAB practicals/assignments, which covers introduction to R Programming and application of R Tool for learning CIS concepts. 

The objective of this LAB is to introduce R Tool, an open source statistical computing environment which can be further used to study various computational intelligent algorithms discussed in subsequent CI labs. This lab will help familiarize you with the R software, including how to access data files, how to define variables, to analyze/process/store data etc.

DIAT postgraduate students and Research scholars can attend this Lab. Note: This lab on Computational Intelligent Systems is to be used as a supplement to a parallel course on the same topic with course code CE-604. It is not designed to be a complete course/tutorial by itself where a student can learn the concepts of CI just by going through these video based designed experiments.

You need laptop with atleast 2 GB memory with windows7 operating system. You also need to install R Tool and R Studio software in order to carry out mentioned lab assignments.

The course will help the students to carry out the research work in different CIS, machine learning applications like classification, regression or clustering tasks etc.


With a vision to ‘Cultivate one Million children in India as Neoteric Innovators’, Atal Innovation Mission is establishing Atal Tinkering Laboratories (ATLs) in schools across India. The objective of this scheme is to foster curiosity, creativity and imagination in young minds; and inculcate skills such as design mindset, computational thinking, adaptive learning, physical computing etc. (Ref: https://atlinnonet.gov.in/page/about.php)

Mentor of Change Program is a strategic nation building initiative to engage leaders who can guide and mentor students in thousands of Atal Tinkering Labs and startups and incubators under the programs of Atal Innovation Mission across India. (Ref: https://atlinnonet.gov.in/page/about.php)

During this corona affected situations, this online platform is adopted for mentoring sessions to allotted school with the aim to encourage ideas, prototype building, inculcating solution-oriented approach amongst the students. The school atal representatives can login through their id to access these contents created in the form of text/video lectures and make them available to the students via online mode. They will be updated whenever new session is added to this course.

As part of ATL session, sharing this article written in regional language marathi for speading awareness among ATL students related to Cyber Security education: 

Part 1:  सायबर सुरक्षेची ओळख
https://svd.gnomio.com/pluginfile.php/318/course/summary/Introduction%20to%20Cyber%20Security%20.pdf

Part 2: ऑपरेटिंग सिस्टिम्स च्या मूलभूत संकल्पना

https://svd.gnomio.com/pluginfile.php/318/course/summary/CyberSecurityEducation_part2.pdf


This 3 weeks course introduces to Flipped Classroom concept and its benefits over traditional classroom. The course consists of total 5 LeDs, LxT Resources, 3 LbD activities, 2 LxI activities, 1 RCA activity followed by graded quizzes in form of KQs, RQs and AQs. Learners also need to complete course entry survey and feedback forms.