faculty
Gokhan Kul, PhD he/him
Assistant Professor
Computer & Information Science
Contact
508-910-6484
gkul@umassd.edu
Dion 307B
Education
2018 | University at Buffalo, SUNY | PhD in Computer Science |
2012 | Middle East Technical University | MS in Computer Engineering |
2010 | TOBB University of Economics and Technology | BS in Computer Engineering |
Teaching
- Cybersecurity
- Computer Systems
- Database Systems
Teaching
Programs
Programs
- Computer Science BS, BS/MS
- Computer Science Cybersecurity
- Computer Science Graduate Certificate
- Computer Science MS
- Engineering and Applied Science PhD
- Mobile Applications Development
- Software Engineering
Teaching
Courses
Laws of computer organization and design for RISC architectures. Interfaces between hardware and software are studied. Influence of instruction set on performance is presented. Design of a processor with pipelining is analyzed. Computer arithmetic is studied. Memory hierarchy and their influence on performance is documented. Elements of interfacing and I/O organization are included. The course has a design, implementation, and analytical components. (Formerly offered as CIS 270)
Preservation, identification, extraction and documentation of evidence in any computing environment. This course follows a practical approach to the practice of digital forensics while presenting technical and legal matters related to forensic investigations. It introduces various technologies used in everyday computing environments along with detailed information on how the evidence contained on these devices should be analyzed.
Cyber defense, operations, cyber warfare, insider threat mitigation. This course introduces the basis to create security programs in organizations by exploring cyber defense mechanisms. The course covers offensive techniques to collect intelligence while remaining hidden in computer systems and infrastructure. It also covers defensive techniques to mitigate malware, evict adversaries from operational systems, and cryptanalysis-based intelligence techniques over encrypted communication.
Preservation, identification, extraction and documentation of evidence in any computing environment. This course follows a practical approach to the practice of digital forensics while presenting technical and legal matters related to forensic investigations. It introduces various technologies used in everyday computing environments along with detailed information on how the evidence contained on these devices should be analyzed.
The relational, hierarchical, and network approaches to database systems, including relational algebra and calculus, data dependencies, normal forms, data semantics, query optimization, and concurrency control on distributed database systems.
Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.
Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.
Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.
Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.
Prerequisites: Completion of three core courses. Development of a detailed, significant project in computer science under the close supervision of a faculty member, perhaps as one member of a student team. This project may be a software implementation, a design effort, or a theoretical or practical written analysis. Project report with optional oral presentation must be evaluated by three faculty members including the project supervisor.
Research
Research awards
- $ 499,999 awarded by Commonwealth of Massachusetts for Mass Skills - Intelligent Industrial Robotics and Cyber Security Test Bed
- $ 286,754 awarded by Office of Naval Research for UMassD MUST IV: Automated Vulnerability and Backdoor Detection as a Part of Software Development Pipeline
- $ 1,218,640 awarded by National Science Foundation for CyberCorps Scholarship for Service: Accelerating Cybersecurity Education, Scholarship and Service
- $ 149,903 awarded by U.S. Department of the Army for Resilience Engineering of Machine Learning-enabled Open World Recognition for Network Intrusion Detection Systems
Research
Research interests
- Cybersecurity
- Database Systems