Introduction to Industrial Chemistry

Numbering Code U-ENG27 17405 LJ60 Year/Term 2021 ・ First semester
Number of Credits 2 Course Type Lecture
Target Year Target Student
Language Japanese Day/Period Wed.1
Instructor name NAKAO YOSHIAKI (Graduate School of Engineering Professor)
KAJI HIRONORI (Institute for Chemical Research Professor)
KOGA TSUYOSHI (Graduate School of Engineering Professor)
MIURA KIYOTAKA (Graduate School of Engineering Professor)
ABE RYUU (Graduate School of Engineering Professor)
MATSUBARA SEIJIROU (Graduate School of Engineering Professor)
KONDOU TERUYUKI (Graduate School of Engineering Professor)
SUGINOME MICHINORI (Graduate School of Engineering Professor)
OGOSHI TOMOKI (Graduate School of Engineering Professor)
MURATA YASUJIROU (Institute for Chemical Research Professor)
ABE TAKESHI (Graduate School of Engineering Professor)
OTSUKA KOJI (Graduate School of Engineering Professor)
TANAKA KAZUO (Graduate School of Global Environmental Studies Professor)
WATANABE HIROSHI (Institute for Chemical Research Professor)
MORI YASUO (Graduate School of Engineering Professor)
EIRAKU GENJI (Institute for Frontier Life and Medical Sciences Professor)
KAWASE MOTOAKI (Graduate School of Engineering Professor)
SOTOWA KENICHIRO (Graduate School of Engineering Professor)
MAE KAZUHIRO (Graduate School of Engineering Professor)
MATSUSAKA SHUJI (Graduate School of Engineering Professor)
Schedule and Contents Guidance,2times,Guidance on how this class is operated, and how to use computing facility for this class. Basic knowledge on the role of IDS in network security and how machine learning can help the intrusion detection.
Intrusion Detection by Signature-Based IDS,5times,Learn the mechanism of intrusion detection by signature-based IDS by studying open source signature-based IDS and attacks, such as correspondence between alarms issued from IDS and communications, and adding signatures to detect attacks.
Intrusion Detection by Machine Learning,7times,Learn the method of classifying normal and malicious traffic by machine learning algorithms and public dataset for benchmarking intrusion detection performance.
Presentation,1time,Based on the exercise, students presents their methods of intrusion detection using machine learning, and discuss it with other students and instructors.
Course Requirements None
Related URL
PAGE TOP