faculty
Gokhan Kul, PhD he/him
Associate Professor
Computer & Information Science
Contact
508-910-6484
gkul@umassd.edu
Dion 307B
Education
| 2018 | University at Buffalo, SUNY | PhD in Computer Science |
| 2012 | Middle East Technical University | MS in Computer Engineering |
| 2010 | TOBB University of Economics and Technology | BS in Computer Engineering |
Teaching
- Cyber Defense and Operations
- Digital Forensics
- Database Design
Teaching
Programs
Programs
Teaching
Courses
Laws of computer organization and design for RISC architectures. Interfaces between hardware and software are studied. Influence of instruction set on performance is presented. Design of a processor with pipelining is analyzed. Computer arithmetic is studied. Memory hierarchy and their influence on performance is documented. Elements of interfacing and I/O organization are included. The course has a design, implementation, and analytical components. (Formerly offered as CIS 270)
Preservation, identification, extraction and documentation of evidence in any computing environment. This course follows a practical approach to the practice of digital forensics while presenting technical and legal matters related to forensic investigations. It introduces various technologies used in everyday computing environments along with detailed information on how the evidence contained on these devices should be analyzed.
Cyber defense, operations, cyber warfare, insider threat mitigation. This course introduces the basis to create security programs in organizations by exploring cyber defense mechanisms. The course covers offensive techniques to collect intelligence while remaining hidden in computer systems and infrastructure. It also covers defensive techniques to mitigate malware, evict adversaries from operational systems, and cryptanalysis-based intelligence techniques over encrypted communication.
Preservation, identification, extraction and documentation of evidence in any computing environment. This course follows a practical approach to the practice of digital forensics while presenting technical and legal matters related to forensic investigations. It introduces various technologies used in everyday computing environments along with detailed information on how the evidence contained on these devices should be analyzed.
Cyber defense, operations, cyber warfare, insider threat mitigation. This course introduces the basis to create security programs in organizations by exploring cyber defense mechanisms. The course covers offensive techniques to collect intelligence while remaining hidden in computer systems and infrastructure. It also covers defensive techniques to mitigate malware, evict adversaries from operational systems, and cryptanalysis-based intelligence techniques over encrypted communication.
The relational, hierarchical, and network approaches to database systems, including relational algebra and calculus, data dependencies, normal forms, data semantics, query optimization, and concurrency control on distributed database systems.
Prerequisites: Completion of three core courses. Development of a detailed, significant project in computer science under the close supervision of a faculty member, perhaps as one member of a student team. This project may be a software implementation, a design effort, or a theoretical or practical written analysis. Project report with optional oral presentation must be evaluated by three faculty members including the project supervisor.
Prerequisite: Completion of three core courses. Research leading to submission of a formal thesis. This course provides a thesis experience, which offers a student the opportunity to work on a comprehensive research topic in the area of computer science in a scientific manner. Topic to be agreed in consultation with a supervisor. A written thesis must be completed in accordance with the rules of the Graduate School and the College of Engineering. Graded A-F.
Prerequisite: Completion of three core courses. Research leading to submission of a formal thesis. This course provides a thesis experience, which offers a student the opportunity to work on a comprehensive research topic in the area of computer science in a scientific manner. Topic to be agreed in consultation with a supervisor. A written thesis must be completed in accordance with the rules of the Graduate School and the College of Engineering. Graded A-F.
Prerequisite: Completion of three core courses. Research leading to submission of a formal thesis. This course provides a thesis experience, which offers a student the opportunity to work on a comprehensive research topic in the area of computer science in a scientific manner. Topic to be agreed in consultation with a supervisor. A written thesis must be completed in accordance with the rules of the Graduate School and the College of Engineering. Graded A-F.
Research
Research awards
- $ 499,999 awarded by Commonwealth of Massachusetts for Mass Skills - Intelligent Industrial Robotics and Cyber Security Test Bed
- $ 286,754 awarded by Office of Naval Research for UMassD MUST IV: Automated Vulnerability and Backdoor Detection as a Part of Software Development Pipeline
- $ 1,218,640 awarded by National Science Foundation for CyberCorps Scholarship for Service: Accelerating Cybersecurity Education, Scholarship and Service
- $ 149,903 awarded by U.S. Department of the Army for Resilience Engineering of Machine Learning-enabled Open World Recognition for Network Intrusion Detection Systems
Research
Research interests
- Cybersecurity for AI
- Software Security
- Data Security