Course Materials | PhD Computer Science

Loading ….

PhD Computer Science


CCS  6100    Advanced Algorithms

  1. Chang, C.-I., & Chang, C.-I. (2013). Hyperspectral Data Processing: Algorithm Design and Analysis. John Wiley & Sons, Incorporated.
  2. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to Algorithms, Third Edition. MIT Press.
  3. Sakiyama, K., Sasaki, Y., & Li, Y. (2016). Security of Block Ciphers: From Algorithm Design to Hardware Implementation. John Wiley & Sons, Incorporated.


 CCS  6101    Advanced Research Methods in Computer Science

  1. Bent, M. J. (2016). Practical Tips for Facilitating Research. Facet Publishing.
  2. Rugg, G., & Petre, M. (2006). A Gentle Guide to Research Methods. McGraw-Hill Education.



CCS 6150     Directed Reading in Computer Science

  1. Arabnia, H. R., Jandieri, G., Solo, A. M. G., & Tinetti, F. G. (2019). Foundations of Computer Science. C. S. R. E. A.
  2. Khanna, R. (2008). Basics of Computer Science. New Age International Ltd.
  3. National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on the Fundamentals of Computer Science: Challenges and Opportunities, & Fundamentals of Computer Science: Challenges and Opportunities Committee. (2004). Computer Science: Reflections on the Field, Reflections from the Field. National Academies Press.
  4. Verdinand, K. C. (2010). Computer Science Research and Technology. Nova Science Publishers, Incorporated.


CCS 6102     Software Engineering Trends

  1. Fujita, H., & Zualkernan, I. (2008). New Trends in Software Methodologies, Tools and Techniques: Proceedings of the Seventh SoMeT_08. IOS Press, Incorporated.
  2. Royer, J. C., Arboleda, H., Arboleda, H., & Arboleda, H. (2012). Model-Driven and Software Product Line Engineering. John Wiley & Sons, Incorporated.
  3. Troussas, C., & Sgouropoulou, C. (2020). Innovative Trends in Personalized Software Engineering and Information Systems: The Case of Intelligent and Adaptive e-Learning Systems. IOS Press, Incorporated.



CCS 6151     Advanced Mobile and Wireless Networking

  1. Bing, B. (2012). Broadband Wireless Multimedia Networks. John Wiley & Sons, Incorporated.
  2. Denko, M. K. (2011). Mobile Opportunistic Networks: Architectures, Protocols and Applications. Auerbach Publishers, Incorporated.
  3. Gibson, J. D. (2012). Mobile Communications Handbook. Taylor & Francis Group.
  4. Guizani, M. (2004). Wireless Communications Systems and Networks. Springer.
  5. Yang, L. T., Syukur, E., & W. Loke, S. (2012). Handbook on Mobile and Ubiquitous Computing: Status and Perspective. Taylor & Francis Group.


CCS 6152     Advanced Data Mining

  1. Han, J., Pei, J., & Kamber, M. (2011). Data Mining: Concepts and Techniques: Concepts and Techniques. Elsevier Science & Technology
  2. Last, M., & Kandel, A. (2010). Web Intelligence and Security: Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web. IOS Press, Incorporated.
  3. Myatt, G. J., Johnson, W. P., & Myatt. (2009). Making Sense of Data II: A Practical Guide to Data Visualization, Advanced Data Mining Methods, and Applications. John Wiley & Sons, Incorporated.


CCS 6153     Advanced Network Security

  1. Bejtlich, R. (2013). Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press, Incorporated.
  2. Chin, S. K., Older, S. B., & Stinson, D. R. (2010). Access Control, Security, and Trust: A Logical Approach. CRC Press LLC.
  3. Musa, S. M. (2018). Network Security and Cryptography. Mercury Learning & Information.
  4. Strebe, M. (2002). Network Security JumpStart: Computer and Network Security Basics. John Wiley & Sons, Incorporated.

Coming Soon …

Coming Soon …

Coming Soon …

Open chat
How can I help you?