To be defined

The student, in keeping with the objectives of the course, will have the opportunity to know and understand the principles underlying the design and application of video systems for surveillance purposes, identification of potential threats, identification and recognition of human subjects in the context of the most important security topics, such as the surveillance of places of interest, access points, installations, people flows.

This course has the objective of providing a basic overview over software architectures and the process of designing complex software systems designs and plans. Rotating around this objective, the course has as its privary goal that of developing proper architectural designs and plans harnessing well-established design principles as well as advanced principles from the recent state of the art, such as Privacy-By-Design or the Deploy-First principles. Finally, with the objective of offering a sufficiently challenging design landscape, the course focuses on data-intensive designs, that is, designs which manipulate Big Data.

The course aims to give students an understanding of the use of intelligence to support security on behalf both of governments and of corporates. Analysis techniques of contents as well as of social networks will to this purpose be provided, by describing their underlying algorithms and by giving access to available software implementations. The student will learn to apply the acquired methodologies through typical applications, such as Web monitoring for the purpose of preventing terrorist acts and sentiment analysis to detect the level of comfort or discomfort in the perception of the company or of the government by its stakeholders (citizens, employees, customers, suppliers, partners), so as to prevent internal and external risk situations.

The student, at the end of the teaching, will know the theoretical and practical aspects underlying the techniques for the analysis of contents and of social networks that can be leveraged for intelligence purposes.


Students, according to the course’s objectives, will get a thorough knowledge about the main biometrics as well as about biometric systems aimed to identity verification and person recognition. This knowledge will include theory and practice of modern biometrics extraction and classification techniques and their application to security systems.

The student, at the end of the teaching, will know the most modern techniques of recognition and authentication of individuals from biometric data, including face, ear, iris, retina and fingerprints, using pattern recognition and pattern matching techniques.

The course provides an overview on software reliability and testing. It also introduces the students to secure programming. Finally, the course provides knowledge on advanced techniques that can be used in the long term in a research carrier focused on data mining for testing comprehension and generation and reliability prediction.

Students will acquire knowledge on the main methods and techniques for analysing the reliability of a software system. Specific emphasis will be given to the secure programming. Students will also acquire advanced knowledge on software testing techniques, with particular emphasis to GUI testing and Object-Oriented software testing. Finally, students will acquire knowledge to properly manage the entire testing process of a large and critical software system.