Skip to main content.
Gokhan Kul

faculty

Gokhan Kul, PhD he/him

Assistant Professor

Computer & Information Science

Contact

508-910-6484

gkul@umassd.edu

Dion 307B

Education

2018University at Buffalo, SUNYPhD in Computer Science
2012Middle East Technical UniversityMS in Computer Engineering
2010TOBB University of Economics and TechnologyBS in Computer Engineering

Teaching

  • Cybersecurity
  • Computer Systems
  • Database Systems

Teaching

Programs

Teaching

Courses

Laws of computer organization and design for RISC architectures. Interfaces between hardware and software are studied. Influence of instruction set on performance is presented. Design of a processor with pipelining is analyzed. Computer arithmetic is studied. Memory hierarchy and their influence on performance is documented. Elements of interfacing and I/O organization are included. The course has a design, implementation, and analytical components. (Formerly offered as CIS 270)

Preservation, identification, extraction and documentation of evidence in any computing environment. This course follows a practical approach to the practice of digital forensics while presenting technical and legal matters related to forensic investigations. It introduces various technologies used in everyday computing environments along with detailed information on how the evidence contained on these devices should be analyzed.

Cyber defense, operations, cyber warfare, insider threat mitigation. This course introduces the basis to create security programs in organizations by exploring cyber defense mechanisms. The course covers offensive techniques to collect intelligence while remaining hidden in computer systems and infrastructure. It also covers defensive techniques to mitigate malware, evict adversaries from operational systems, and cryptanalysis-based intelligence techniques over encrypted communication.

Preservation, identification, extraction and documentation of evidence in any computing environment. This course follows a practical approach to the practice of digital forensics while presenting technical and legal matters related to forensic investigations. It introduces various technologies used in everyday computing environments along with detailed information on how the evidence contained on these devices should be analyzed.

The relational, hierarchical, and network approaches to database systems, including relational algebra and calculus, data dependencies, normal forms, data semantics, query optimization, and concurrency control on distributed database systems.

Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.

Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.

Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.

Department seminar presentations by speakers from industry and academia in addition to UMass Dartmouth faculty, and CIS Master student thesis defense presentations that are scheduled during the seminar course time slot. Students are required to attend these presentations and participate in technical discussions and write a report by the end of the semester.

Prerequisites: Completion of three core courses.   Development of a detailed, significant project in computer science under the close supervision of a faculty member, perhaps as one member of a student team. This project may be a software implementation, a design effort, or a theoretical or practical written analysis. Project report with optional oral presentation must be evaluated by three faculty members including the project supervisor.  

Research

Research awards

  • $ 499,999 awarded by Commonwealth of Massachusetts for Mass Skills - Intelligent Industrial Robotics and Cyber Security Test Bed
  • $ 286,754 awarded by Office of Naval Research for UMassD MUST IV: Automated Vulnerability and Backdoor Detection as a Part of Software Development Pipeline
  • $ 1,218,640 awarded by National Science Foundation for CyberCorps Scholarship for Service: Accelerating Cybersecurity Education, Scholarship and Service
  • $ 149,903 awarded by U.S. Department of the Army for Resilience Engineering of Machine Learning-enabled Open World Recognition for Network Intrusion Detection Systems

Research

Research interests

  • Cybersecurity
  • Database Systems

Additional links

    Back to top of screen