FIRST YEAR First Semester
 Introduction to risk theory
 Instability of complex systems
 Fuzzy mathematics and applications
 Probabilities and statistics
Second Semester
 Mathematical methods in risk theory
 Cryptography and Codes
 Geometrical methods in chaos theory
 Differential models in sciences
SECOND YEAR
First Semester
 Methodologies and techniques for Safety Reports preparation
 Safety of the industrial plants with significant risk of accidents
 Methods inspired from nature for risk management
 Elective Course
a. Data mining in risk analysis
b. Nuclear and radiological security
Second Semester
 Computer science
 Viruses and antiviruses
 Reverse engineering and protection techniques
 Introduction to network security
 Elective Course
a. Petri Nets and applications in risk theory
b. Categorial models in risk theory
 Natural risks
 Seismic and volcanic hazards
 Biological risks analysis and evaluation
 Ecogenomics
 Elective Course
a. Applications of risk theory in aeronomy
b. Radiation protection
C. economical and social risks
 Risk and decisionmaking
 Risk management
 Statistical analysis of financial risk
 Elective Course
a. Viruses and antiviruses
b. Introduction to network security
D. technological risk
 Nuclear decommissioning
 Chemical plants: safety and security
 Nuclear Plant Safety
 Elective Course
a. Nuclear plant protection
b. Risk and security in medical physics
Introduction to Risk theory Ennio Cortellini
Course Aims and Objectives: The course is aimed at identifying the evolution and technique applications of the risk theory in the sciences and engineering Short Content: History of the Risk concept. Theoretical issue in Risk analysis and background. Risk analysis and decisions theory. Systems analysis and quantification. Uncertainty modeling and risk measurement
Instability of complex systems Gelu Bourceanu
Course Aims and Objectives: To study the stability or instability of stationary states and branching which occur in complex systems evolving according to a strong nonlinear dynamic when constraints acting on the border of complex systems exceed certain critical values. Short Content: Complex systems. The evolution of these systems. Stability or instability in evolving complex systems. Temporal or timespace order. The chaotic behavior. Real examples from the atmosphere. The risk of destruction of the food chain. The stability of ecosystems.
Fuzzy mathematics and applications Ioan Tofan
Course Aims and Objectives: To present new methods to formalize the uncertainty, using a possible information’s classification: perceptional information, measured information, qualitative or quantitative information. Short Content: Fuzzy sets. Fuzzy numbers (and their arithmetic). Fuzzy Relations (similarity, order).Fuzzy Logic.
Probability and statistics Teodor Havârneanu
Course Aims and Objectives: Students will get used with Probability and Statistical Mathematical terminology and will be able to use the presented results to solve different problems. Short Content: Probability theory. Probability Space. Statistics
Mathematical methods in Risk Theory Ovidiu Cârjă
Course Aims and Objectives: Students will get used with risk theory terminology and will be able to use the presented results to solve different problems and to model different economic situations. Short Content: Probability notions used in risk theory. Random variables presented as an example of claim amount. Risk process. Premium calculation. The credibility premium.
Cryptography and Codes Aurelian Claudiu Volf
Course Aims and Objectives: Introduction to the basic concepts in information theory and digital information transmission, errorcorrecting codes, cryptography, data security, digital signatures. Short Content: Concepts in information theory, Shannon’s Theorem. Finite fields. Classes of codes: linear, Hamming, perfect codes, cyclic codes, ReedSolomon, BCH. Convolutional codes, turbo codes. Applications: compact discs. Cryptography: simple examples of cryptosystems. Information security, symmetric key encryption, public key encryption, digital signatures, authentication, identification, protocols and mechanisms, attack classes. Hard problems used in cryptography: integer factorization and the RSA cryptosystem, discrete logarithm problem, knapsack. Efficient algorithms and standards: DES, AES, SAFER, RC5, PGP
Geometrical methods in chaos theory Mircea Crâsmareanu
Course Aims and Objectives: To understand in order to use the modern differential geometry concepts which offer technical tools for modeling some aspects of Chaos Theory. Short Content: Basic Notions in Differential Geometry. Riemannian Approach to chaos. Phase transitions. Nonlinear Dynamics. Topology Change. Complex Nonlinearity
Differential models in Sciences Gheorghe Aniculăesei
Course Aims and Objectives: The main objective of the course is to describe and analyze the differential models for different phenomena from physics, chemistry, biology, economy. Short Content: Generalities. Description of a mathematical model. Deterministic and stochastic models, stationary and nonstationary, linearly and nonlinearly. Basic terminology in differential equations(DE) and partial differential equations (PDE). An attempt to describe different phenomena in terms of mathematics using DE or PDE.
Methodologies and techniques for Safety Reports preparation Ferroni Luisa
Course Aims and Objectives: The course is intended to provide guidance on the preparation of “Safety Reports” to meet the requirements of the Seveso II Directive (96/82/EC), on the control of major accidents involving dangerous substances. High hazard industries are expected to prevent major accidents which involve dangerous substances. They are also expected to take measures which limit the consequences of such accidents for man and the environment. In all European Countries this expectation is backed by national legislation, directly deriving from the European Community issued Directive 96/82/EC (known as Seveso II), which defines what must be done to demonstrate compliance. Short Content: Safety report and implementation of the Directive. Contents and structures for the description of the establishment and its environment. Dangerous substances and hazardous reactions. Procedures for risk analysis techniques (outline). Consequences assessment techniques. Internal emergency planning.
Safety of the industrial plants with significant risk of accidents Massimo Frullini
Course Aims and Objectives: To provide an introduction to risk and reliability engineering of the industrial plant at high risk of accident. This course attempts to define a framework for the risk analysis study through the industrial system design and management. In an industrial system design process the designers optimize technical aspects of the plant, respecting safety guidance and standards. In spite of the importance of risk analysis we present some common risk analysis methods. Also we present a sample and effective technique to identify the most critical factors that influence the safety of the industrial systems (chemical, hydraulic, aerospace and nuclear) and to increase attention on safety and actions undertaken to produce safer design processes and management. Short Content: Industrial accident risk analysis. Risk acceptability criteria. Accident risk analysis methodologies. Reliability of complex system. Probabilistic safety assessment. Industrial plant components failure data. Human factor. Risk in the chemical plants. Guidelines for increasing safety levels. Risk management and safety report. Risk in the hydraulic plants. Risk in the maritime transport. Risk of accidents in the aerospace industry. Nuclear safety guidelines. Nuclear plant decommissioning. Radioactive waste disposal.
Methods inspired from nature for risk management Henri Luchian
Course Aims and Objectives: The course explores how computational intelligence methodologies could be applied and could augment the risk assessment processes. Artificial neural networks, ant colony optimization, particle swarm and evolutionary algorithms are of particular interest. Case studies on realworld problems, from different domains, like the portfolio optimization, the air traffic management and the military capability planning will be considered and discussed. Short Content: General introduction on risk analysis and management. Methods inspired from nature and some riskanalysis related applications of these. Evolutionary computing – mainly Genetic Algorithms – and their applications in risk assessment. Computational Red Teaming. Applications in air traffic management and defense capability planning.
Data Mining for risk management Henri Luchian Course Aims and Objectives: The course will integrate data mining concepts and techniques with risk management concerns. The students will be able to identify and use specific data mining techniques for approaching problems related to risk management from different domains. Short Content: Association rules. Clustering. Classification. Outlier detection. Time series analysis and prediction. Bayesian networks and decision trees. Applications in Risk Management from domains such as Geology, Finance, Insurance, Biomedicine, Software etc.
Nuclear and radiological security Catalin Borcia
Course Aims and Objectives: Acquiring knowledge about radiation sources and the effects of radiation on people and the environment. Ability to identify and quantify risks associated with radiation use and implement security methods in working with radiation sources, both current practice and in exceptional circumstances. Ability to propose solutions in case of exposure to radiation and to take preventive action. Short Content: Nuclear physics, radiation physics. Radiationsubstance interaction. The effects of radiation’s exposure. Radiology’s protection system. Radiation pollution. Radiation waste management. Medicinal utilization of radiations. Risks associated with radiation manipulation. Radiation emergencies.
Viruses and antiviruses Dănuţ Rusu
Course Aims and Objectives: After this course the students must understand what is an informatic virus and their dangers, they have also to know the main classes of viruses, the methods of virus detection and how an antivirus work, Short Content: Generalities. Viruses classification. How a virus is made. The study of a some widespread viruses. Antiviruses. The study of codes, recompiling and testing of a some widespread viruses. Rewriting their codes and examining the new viruses. The study and rewriting of codes of an antivirus.
Reverse engineering and protection techniques Dănuţ Rusu
Course Aims and Objectives:
After this course the students must understand how a disassembler works, how to obtain the source code from a disassembled code, how to protect the compiled code by means of some obfuscation methods.
Short Content: Reverse engineering  generalities. Decompiling. Instructions set of JVM and the class format. Decompiling techniques of the class format. Protection methods against the decompiling.
Introduction to network security Marius Apetrii
Course Aims and Objectives: At the end of the course the students should be familiar with basic techniques which ensure the information security in internet and intranet. They should have to know the dangers to the security of the informatics systems and the theoretical and practical solutions to reduce/eliminate them, and to know the classical methods for compressing and encrypting data. Short Content: Basic concepts. Elements of sending and coding information theory. Requirements and security politics. Security models, security methods for systems. Elements of cryptography. Secure communications protocols. Implementation procedures. Identification and authentification, digital signature, the security of the data transfer. Network security (IPsec, SSL, Kerberos, VPN, wireless, firewall). Operating systems facilities for protection and security. Email security (PGP, S/MIME), ecommerce applications security, electronic vote, etc.
Categorical models in risk theory Mihai Gontineac
Course Aims and Objectives: Introducing the auditory to the study of the metalanguage of Category Theory in order to identify various categorical constructions used in Mathematics, in theoretical foundations of Computer Science’s concepts, in real world applications with Risk’s theory connections (emphasizing distributed information systems’ security) Short Content: Categories, functors and natural transformations. Limits and colimits. Adjoint functors. Algebras and coalgebras. Monads. Closed Cartezian Categories. Monoidal Categories. Security in Distributed information systems
Petri nets and applications in risk theory Mihai Gontineac
Course Aims and Objectives: Petri Nets are one of the most common graphical techniques used in specification and projection of discrete dynamical systems. In the same time, Petri Nets offer a very strong mathematical formalism in dynamical behavior analysis of complex systems (like concurrency, asynchrony, common resource sharing, and so on). The initial model was later enriched with time (Timed Petri Nets), or with stochastic behavior (Stochastic Petri Nets). In the beginning, the first applications were in computer networks and communication protocols. Later, Petri Nets began to be used in order to model, to analyze, and to control production systems (like supply nets). Short Content: Formal Languages. Introduction in Petri Nets. Petri Nets and safety analysis. Petri Nets and risk modeling
Seismic and volcanic hazards Gabriel Ovidiu Iancu
Course Aims and Objectives: To get accustomed to seismic phenomena and to recognize the main volcanic activities and their associated hazards. During the lectures will be presented the triggering mechanisms of the earthquakes and volcanoes as well as basic knowledge concerning the earthquake and volcanic prediction. Short Content: Seismic Hazards Module: Types of earthquakes; Seismic hazard assessment (seismic intensity and magnitude scales); Seismic waves and rays; Earth’s free oscillations; Seimic Waves and Earth’s Interior; Earthquake focal mechanism; Earthquake recording; Seismogram interpretation; The transfer mechanism of the seismic motions over the buildings; Earthquake prediction. Volcanic Hazards Module: Classification methods of the volcanic activity; Volcanoes and the Plate Tectonics; The origin of magma, Compositional diversity of magmas; Magma types, Magma chamber, Volcanic edifice, Triggering of volcanic eruptions; Types of volcanic eruptions; Global distribution of volcanoes; Volcano monitoring and research; Prediction of volcanic activity  hazards; The economic and cultural benefits of volcanoes.
Biological risks analysis and evaluation Mirela Mihaela Cîmpeanu
Course Aims and Objectives: Students should be able to understand terms like hazard, exposure, consequence and probability focusing on area as toxicology, epidemiology and statistical analysis Short Content: Chemicals and chemical exposures. Naturally occurring chemicals. Synthetic chemicals. Products of nanotechnology. Human exposure to chemicals. Exposure pathway. From exposure to dose. Expressions of dose. Dose estimation. Direct measures of dose. From dose to toxic response. Toxic agents and their targets. Carcinogens. Nanotechnology – risks and rewards. Healthcare and safety management. Risk assessment – legal issues
Ecogenomics Lucian D. Gorgan
Course Aims and Objectives: Founding the base for studies in molecular ecology and phylogeny. To create new experimental models for studying molecular ecology and phylogeny. The importance and relevance of molecular studies applicable in ecology, phylogeny and phylogeography. To create new molecular concepts about different systematic and evolutive aspects. Short Content: The concept of molecular ecology. Molecular genetics in Ecology. Phylogeography. Integrative ecological genomics. Molecular approaches to behavioral ecology. Conservation genetics. Molecular ecology in a wider context.
Applications of risk theory in aeronomy Gelu Bourceanu
Course Aims and Objectives: To study the importance of ozone for the life on planet Earth; Short Content: Aeronomy: an interdisciplinary science. The formation and the importance of ozone (O3) in the stratosphere. Complex reactive models rendering the formation and destruction of ozone. Numerical integration of the system of homogeneous and inhomogeneous differential equations. The risk of increasing anthropogenic chemical species concentrations such as CH4, N2O, CFxCly, etc. over a limit. Reducing emissions of CO2, CH4, SO2 to prevent the greenhouse effect and global warming.
Radiation protection Antonio Moccaldi
Course Aims and Objectives: Radiation protection, sometimes known as radiological protection, is the science of protecting people and the environment from the harmful effects of ionizing radiation, which includes both particle radiation and high energy electromagnetic radiation
Risk and decisionmaking Bogdan Anastasiei
Course Aims and Objectives: Understanding how to frame a decision using techniques for generating, for assessing decision alternatives. Also, how to use specialized software to perform Monte Carlo simulations and sensitivity analysis. Short Content: Introduction to decision making. Statistics, probability theory and decision. Defining the decisional frame. Identifying the decisional risk. Analysing and handling the decisional risk. Monte Carlo simulation. Sensitivity analysis. Implementing the decision.
Risk management Bogdan Anastasiei
Course Aims and Objectives: Mastering the risk identification and risk assessment techniques. Using the risk control and risk financing techniques. Nature of risk and incertitude. Understanding the impact of risk over the organizations Short Content: Identifying risk exposure in the organization: practical methods. Assessing losses using statistical methods How to avoid, prevent and hedge the organizational risks. How to treat specific risks: operational risks, investment risks, currency risks etc. Insurance buying: how to set priorities. Risk planning: budgeting
Statistical analysis of financial risk Mariana Gagea
Course Aims and Objectives: The identification of main financial risks and of instruments specialized in risk management. Short Content: The definition and classification of financial risks. The overview and importance of financial risk management. The market risk  evaluation and management. The interest rate risk – evaluation and management. The credit risk  evaluation and management. The credit risk management through credit derivatives. Currency risk  evaluation and management. The financial risks in international markets The overview of hedging operations. The evaluation of market risk. Market risk management through futures contracts and options on stock indexes. The quantification of interest rate risk. Interest rate risk management through financial derivatives. The evaluation of credit risk. Credit metrics and the methodology KMV.
Viruses and antiviruses Dănuţ Rusu
Course Aims and Objectives: After this course the students must understand what is an informatic virus and their dangers, they have also to know the main classes of viruses, the methods of virus detection and how an antivirus work Short Content: Generalities. Viruses classification. How a virus is made. The study of a some widespread viruses. Antiviruses. The study of codes, recompiling and testing of a some widespread viruses. Rewriting their codes and examining the new viruses. The study and rewriting of codes of an antivirus.
Introduction to network security Marius Apetrii
Course Aims and Objectives: At the end of the course the students should be familiar with basic techniques which ensure the information security in internet and intranet. They should have to know the dangers to the security of the informatics systems and the theoretical and practical solutions to reduce/eliminate them, and to know the classical methods for compressing and encrypting data. Short Content: Basic concepts. Elements of sending and coding information theory. Requirements and security politics. Security models, security methods for systems. Elements of cryptography. Secure communications protocols. Implementation procedures. Identification and authentification, digital signature, the security of the data transfer. Network security (IPsec, SSL, Kerberos, VPN, wireless, firewall). Operating systems facilities for protection and security. Email security (PGP, S/MIME), ecommerce applications security, electronic vote, etc.
Nuclear decommissioning Ennio Cortellini
Course Aims and Objectives: The course is aimed at identifying engineering methods for decommissioning of nuclear power plants. Short Content: Decommissioning of reactors, storage facilities, and containers: Reactors and Containers. Public acceptance. Issues associated with geological disposal. Economics. Design objectives: Radiological safety, Criticality control, Containment, Shielding , Structural considerations, Thermal considerations. Operations. Safeguards. Quality, reliability, maintenance, and repair. Cost3
Chemical Plants: Safety and security Giuseppe D’Ascenzo
Course Aims and Objectives: The course is aimed at describing chemical plants, focusing on issues relevant to safety and security. Short Content: Activities involving chemical agents. Occupational exposure limit values for workers at work. Biological limit value for workers at work. Minimum requirements for the protection of workers. Employers' obligations to determine, assess and prevent risks arising from 'hazardous' chemical agents. Protection measures. Health surveillance. Risk evaluation and management of chemical risk in the research laboratories and in the chemical plants
Nuclear plant safety Maurizio L. Cumo
Course Aims and Objectives: The course is aimed at describing nuclear power plants, focusing on issues relevant to safety. Short Content: Principles of nuclear reactions in nuclear power plants, nuclear heat generation, description of reactor cores, of main coolant systems and of main auxiliary systems. the role of nuclear plant containment
Nuclear plant protection Antonio Naviglio
Course Aims and Objectives: The course is aimed at identifying the risks associated to radioactive material release and to describe the provisions for achieving the fulfillment of allowable doses to population and operational personnel. Short Content: Reference to maximum allowable doses. Accidents leading to radioactive releases. Design criteria to prevent abnormal conditions leading to failure of barriers to radioactive release. PSA – Accident Analyses
Risk and security in medical physics Catalin Borcia
Course Aims and Objectives: Knowledge of radiation sources and biological effects of ionizing radiations Ability to identify and quantify the risks associated with the use radiations for medical purposes Ability to implement security methods for medical use of radiations Ability to indicate solutions in case of occurrence of a radiological exposure and to deploy preventive actions. Short Content:Knowledge of nuclear and radiation physics; interraction of radiations with matter; biological effects of radioation exposure; radiological protection system; the use of radiations in medicine; radiological security standards.
