The MSCS offers excellent curriculum that blends theoretic foundations of computer science with the state-of-the-art computing technologies. The program provides students with opportunities in computer science research, advanced project development and interdisciplinary study, with maximum of flexibility in study plans and class attendance options.

    1. Curriculum featuring the state-of-the-art computing technologies:
  • Mobile computing, mobile app development, wireless networking
  • Game design and development, modeling, and simulation
  • Database, data warehousing, and data mining
  • Cloud computing, high performance computing, distributed computing
  • Computing security
    2. Three degree models
    • Thesis model
    • Non-thesis model
    • Interdisciplinary CS model

    3. Full time/part time study plans and flexible class attendance options

      4. KSU BS/MS Accelerated Plan
    • 4+1 BS/MS Accelerated Plan
    • 4+1.5 BS/MS Accelerated Plan, with part-time MSCS

    5. Closely working with faculty in research and project development

    Time to Submit Your Thesis?

Follow


Theses from 2020

PDF

Optimal Order Assignment with Minimum Wage Consideration (OOAMWC), HAKEM ALAZMI

PDF

Performance of Malware Classification on Machine Learning using Feature Selection, Nusrat Asrafi

PDF

Fast Clustering Using a Grid-Based Underlying Density Function Approximation, Daniel Brown

PDF

Classifying Imbalanced Financial Fraud Data Utilizing Enhanced Random Forest Algorithm, Charles Gardner

PDF

Improving the Maximum Power Point Tracking Efficiency of Photovoltaic Arrays via Machine Learning and Deep Learning, Sumedha Inamdar

PDF

SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek

PDF

Deep Learning for Identifying Breast Cancer, Yihong Li

PDF

The Trend Of Digital Currency By Mining And Analysis Of Patent, Feiyang Qu

PDF

A FEDERATED DEEP AUTOENCODER FOR DETECTING IOT CYBER ATTACKS, Christopher M. Regan

PDF

DATA MINING AND IMAGE CLASSIFICATION USING GENETIC PROGRAMMING, Mahsa Shokri varniab

PDF

Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection, William T. Stone and Junggab Son

PDF

Graphical Representation of Text Semantics, Karl Kevin Tiba Fossoh

PDF

Deep learning for identifying Lung Diseases, Lin Wang

PDF

Leveraging Smart Contracts for Asynchronous Group Key Agreement in Internet of Things, Victor Youdom Kemmoe and Junggab Son

PDF

An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System’s Log Files Analysis, Vannel Zeufack

Theses/Dissertations from 2014

PDF

Tapjacking Threats and Mitigation Techniques for Android Applications, Vanessa Cooper