List of Master and Diploma Theses
2024
- Bondarenko, Nikita
Enhancing Browser Security: Improvement to the FPKI Plugin - Hafke, Jakob
Investigating low SNR tracking in a MIMO-FMCW-Radar Application Using a Particle Filter - Katibeh, Kaywan
Hertzbleed Attacks: Analysis on Capabilities as Side and Covert Channels - Kohler, Leander
Exploring Malicious Stalling Code Regions in Emulation - Kühn, Sebastian
Maximum a Posteriori Localization of Radioactive Point Sources Using Scintillating Gamma Detectors - Kühnemann, Pascal
Applicability of Data - Flow Stitching to Modern Linux - Lehmann, Felix
Attention Mechanisms in Neural Networks for Side Channel Analysis: A Study on GPAM - Lomberg, Michael
Decompilation Utilizing Large Language Models - Maadanli, Rouaa
Active Learning for Few-Shot Keyword Spotting - Marks, Marvin
An Explorative Approach towards Minimal Vulnerability Patch Signatures - Paul, Sumit Arjun
Version Watcher: A Vulnerability Tracking System for npm Packages - Ringwelski, Marten Georg
NeighBSim: Context-Sensitive Binary Code Simliarity using Call-Graph Neighborhoods - Ruhland, Lucca
On Systematic Soundness Testing of Static Binary Analysis - A Proof-of-Concept Implementation for the CWE_Checker - Shevchishin, Maxim
Towards AI-Powered Automatic Debugging - Sokolowska, Marta Dorota
Comparison of Cloud Computing Ecosystems from Behavioral Security Perspective - Struck, Lukas
Comparing Code Representations and Graph Neural Network Architecture Performances for Vulnerability Detection - Wanli, Amr
JSAlchemy: Bridging Automated and Interactive JavaScript Deobfuscation Techniques Using Language Server Protocol
2023
- Afshar, Bita
Usable Security and Privacy End User Assessment Metric Review - Auler, Nils
Application of Multipath-TCP in a Tactical Scenario - Basse, Alexander
Platform and Library Agnostic TLS Key Material Identification in Memory Dumps - Fasaye, Henry
Graphical User Interface for AI-guided Fuzzers - Goos, Tim
Another Kind of Supply Chain: Stack Overflow Snippets - Grohs, Julia Angelika
Usability and Classification of 2FA Recovery Methods - Hein, Lennart
Only Trust Yourself - Defending a Virtual Machine Against Co-Hosted Microarchitectural Attacks - Jahan, Farhin
Analysis of Security of YouTube Tutorials - Karaman, Hüseyin
An Evaluation of Open-Source Search Engines for Digital Forensics - Khan, Mohammad Asif Irfan
Development of a performance test system for F-PKI with evaluation of F-PKI with it - Hoffmann, Melina
Linking Online and Offline Identity Profiles for Future Fraud Protection - Kempf, Lukas
Topology-Based Intrusion Detection for Malware in Homogenous Windows Networks - Kree, Lukas
A Case Study on Discovering Common Web Vulnerabilities in Open Source PHP Applications Using Automated Semantic Code Analysis - Lin, Heng-Yi
Fuzzing Java Programs with Jazzer - Lippmann, Evelyn und Vellmer, Tim
Performance of LVI Mitigations Based on Intel x86 Architecture Regarding non-SGX Environments - Marks, David
Fireformer: A Modular Two-Branch Video Transformer for Wildfire Prediction - Martius, Florin
Do Students Contribute? Identifying Student Motivation and Barriers in Contributing to Open Source Software - Melchers, Marcel
Cryptographic Function Identification using Machine Learning - Mikus, Philipp
Machine Learning Techniques for Improved Calibration of Dual-Polarized Antenna Arrays - Mwangase, Isunge
Overview of Usability in Usable Security User Studies - Nagy, Daniel
Filtering Internet Background Noise from Network Captures - Nesaei Mosaferan, Dastan
Offensive and Defensive Methods for eBPF-based Linux Rootkits - Implementation of an eBPF Rootkit & Memory Forensics Plugin - Pietz, Jodie
Corporate Risk Awareness Regarding Identity Theft and Account Takeover - Preetha, Punya Parvathy
Improving Interactive Question Answering Systems Over Knowledge Graph - Rahman, Mushfiqur
Adoption of Security Analysis Tools: Developer's Perspective - von Rechenberg, Merlin
Directed Linux Kernel Fuzzing: Improving the Debugging Process for Reported Kernel Crashes - Schessler, Maxim
Integrating Google's Oss-Fuzz in a SBFL Analysis Pipeline - Schmetau, Edgar
Secure Distributed Sensor Networks for Device Location Tracking - Spieß, Florian
Aerial Monte Carlo Localisation with Image Patch Descriptors - Sterzenbach, Nicolas
Study of User Behavior Regarding Update Messages from Security Perspective - Stuke, Charlene
Detection of Malicious Packages with Automaticlly Generated Semgrep Rules - Tasch, Sebastian
IDN-Android-Viz: Development and Evaluation of an IDN Visualization App - van den Bosch, Mauritz
Static detection of Uninitialized Variables in Linux Binaries - Vierthaler, Johann Sebastian
Ways of Getting the (in-)secure Answer - Evaluating the Solution Seeking Behavior of Software Developers for Security Related Topics - Werberich, Elias
Evaluation of Distributed Network Emulation Using EMANE in a Containerized Environment - Wilkat, Tobias
A Critical Analysis of Methods to Learn Vulnerable Code Patterns Based on CVE Patch Data
2022
- Aljabr, Somar
Meaning of Effect Sizes - Aminian, Armin
How to specify IPTables rules via GraphML in WireGuard networks - WGEasywall: A tool for managing WireGuard networks and IPTables - Aqash, Mirza Muhammad
JACOZER: Coverage Guided Concurrency Fuzzing of Java Applications - Aytekin, Orhan
Performance Evaluation of Candidate State-of-the-Art Pseudonymization Functions - Betke, Felix
Evaluation of Meltdown-type Attacks on Intel SGX - Bungartz, Christian
Topology-Based Intrusion Detection for Homogeneous IoT Devices - Reproducable Generation of Diverse IDS Datasets - Erem, Cüneyt
Improving Let's Hash: Development of a website helping developers with security-related programming tasks - Gehlen, Joshua
On Advanced Methods for Tensor-Based State Estimation - Gottwald, Apolonia
Simulations for the Practical Usability of Quantum Communications Networks - Hakoupian, Alina
Categorization, Detection and Analysis of Android Malware in a Forensic Context - Jin, Niu
Reserach of citizens' attitudes towards national surveillance implemented by agencies in China in different situations - Keienburg, Cedric Manuel
Leveraging crowd-sourced knowledge for automatic target annotation to effectively guide fuzzing campaigns - Kizilkaya, Bilal
How are people influenced by Open Source - Identification of Misconceptions with a user based study - Kremeyer, Tobias Andreas Stephan
Analysing the Current IoT Threat Landscape Using Honeypots - Kutzner, Joris
Evaluating the Efficacy of Signature Scanning in Live Memory - Liessem, Simon
Hooking Based Unpacker - Löhr, Marvin
Fidelity of Intermediate Representations of Assembly Code - Mertens, Anne Sophia
Developer's Mental Models of Security Threats - Oßwald, Florian Konrad
Towards Metric Monocular Depth Estimation from the Bird's Eye View - Pohl, Timo
Dynamic Capability Reduction to Create Resilience against Malicious Software Updates - Römer, Leon
Reinforcement learning in ad-hoc networks with authentication mechanisms based on key-insulated signatures - Scheffczyk, Jan
Introducing the component coreference resolution task for requirement specification - Scherer, Paul
A Comparison of Alert Prioritsation Methods in SOCs - Sergeev, Aleksandr Sergei
Quantifying Robustness in Tactical Networks using Reinforcement Learning - Stachura, Arkadiusz Marcin
- Fingerprinting Biomechanical Characteristics of Keystrokes
- Stavrou, Ioannis
Design and Implementation of an Environment for the Analysis of MANET Routing Protocol Performance - Suleman, Sherwan
Funktionsweise und Verbreitung von TLS 1.3 - Tauchert, Sebastian
Building and Evaluating Browser and Static Site Generator Plug-Ins for Hash-Based Content Verification - Tsang, Chih-Teng
Studying the Acceptance and Privacy Concerns of Physical and Virtual Government Surveillance in Taiwan compared to Germany - Wani, Mohammad Saalim
An Investigation of 5G non-stand-alone Vulnerabilities - Wilms, Leo
How May Explainable Artificial Intelligence Improve IT Security of Object Detction? - Zißner, Philipp
Traffic Model based on Heterogeneous Data Fusion to support Intelligent Transportation Systems
2021
- Akhmedjanov, Ulugbek
Implementation and Evaluation of the Bluetooth Frequency Hopping Mechanism as Covert Channel Technique - Aljallad, Shaker
Quantum Resistant Authentication in TLS 1.3 Using Mixed X.509 Certificate Chains - Altaf, Asif
Payment Usability and Perceived Security - An Empirical Study of Payment Method Perception and Adoption in Pakistan - Beckert, Karla
Detecting Recent Identity Leaks in News Articles using Modern Machine Learning Methods - Bilstein, Felix
Capability Analysis on Malicious Software - Blatt, Manuel
Analysis of Code Reuse and Obfuscation in .NET Malware - Franz, Benjamin Tobias
Introducing a Global OS Privacy Dashboard – Including an Evaluation of Users’ Perceptions, Attitudes, and Needs Regarding History Data - Geierhaas, Lisa
LetsHashSalt - Design of a Website Helping Developers with Secure User Password Storage and Authentication - Gerlach, Thore
Knowledge Gradient for Policy Rollout Algorithms - Großmann, Jonas
Efficient, Accurate and Fault Tolerant Parsing of Leaked Identity Records - Härig, Julian
Improving Automated Debugging - Handke, Sebastian Thomas
Mission Planning for Passive Radar - Optimization for Multiple Receivers and Technologies - Haubold, Sven
Stealth Attacks on Integrated Bridge Systems - Hennies, Arne
Detection and Recognition of WordPress Plugins and Themes by Patterns and Fingerprints - Höltervennhoff, Sandra
Examining the Effect of Bonus Payment on Code Security in a Developer Study - Horstmann, Stefan
Designing and Evaluating an Instrument for Identifying Software Developers in Online Questionnaires - Klimke, Melvin
Evaluation of C-String Abstract Domains on Router Firmware - Krebs, Steffen
Clustering Text-Based Logs with an Empirical Offline Approach - Krestel, Markus
Sensor Path Planning for Multi-Emitter Localization using Policy Rollout - Kropp, Maxim
Contribution to the Development of an Official File Standard for IDN Laser Data - Lackner, Arthur
What Influences User Trust in a Contact Tracing App? - Leuschner, Oliver
Using Machine Learning Methods for System Activity Detection in Functional Requirements - Loevenich, Johannes
A Stochastic Uncertainty Model to Measure and Improve the Robustness of Tactical Systems in Ever-Changing Communication Scenarios - Maligera Eswarappa, Sharath
Adaptive QoS in SDN-Enabled Heterogeneous Mobile Tactical Networks - Mateyna, Anna-Mariya
Analyzing and Evaluating Apple Operating System Artifacts for Forensic Purposes - Meneghetti, Roland
Trust Certificates through your Smartphone - Analysing and Implementing a Proof of Concept to Certificate Validation via Smartphone - Müller, Andreas
Automatic Generation of JavaScript Fuzzing Targets - Noack, Phil-Tabeas
Black-Box Impersonation Attacks Against an ID Document Photo to Selfie Matching AI - Polewcyk, Joanna
Aircraft Trajectory Prediction and Time Estimation Adapting Social LSTM - Prämaßing, Jonas
Portable Data Collection Framework and Analysis of Automated Authorization Attempts - Prahl-Kamps, Maximilian
A Method for Analysis and Real-Time Emulation of IP Radios - Reiter, Alexander
Using Code Analysis to Find Malicious Projects on PyPl - Retzmann, Simon
An Analysis of the Docker Ecosystem in Practice - Röth, Konstantin Norbert
Forensic Analysis of Distributed File Systems - MooseFS as a Case Study - Schell, Roman
Digging for Artifacts in Process Memory - Schenk, Kai
Malicious Domain Classification using Machine Learning - Schiffer, Paul
Distribution of Security-critical Bugs in Open Source C Projects - Schröter, Felix
Use RIPE ATLAS Data to Investigate Prefix Hijacking Partitions - Serafini, Raphael
Merit of a Digital Solution for the Prevention of Door-Step-Scams - Singh, Kainaat
Fuzzing Intel Graphics Drivers Using Syzkaller and KAFL: A Comparative Analysis - Sorgatz, Christian
Security in Public Code Repositories: Mitigating Typosquatting Attacks Using Namespaces - Swierzy, Ben
WiFi Indoor Localization Systems based on Signal Strength and their Calibration - Tennié, Jonas
Change Drift: Anomaly Detection Based on Divergent Behaviour of Homogeneous IoT Devices - Ufer, Max
Algorithmic Heap Layout Manipulation in the Linux Kernel - Waffenschmidt, Pascal
A Threat Intelligence System for Detecting Recent Identity Leaks - User Interface and Framework Development
2020
- Abediyarandi, Neda
Code Reviewing as a Methodology for Investigating the Security of JDBC Against SQL Injection - Ahmadi, Farzaneh
Semi-Automated Fuzz Target Generation For Java - Batenipour, Negar
Understanding the Conception of Password Policies: A Qualitative Approach - Fano, Andy
Optimizing Kubernetes Cluster Performance - Hackländer, Aaron Lee Louis
Optimized Rule Processing and Regular Expression Matching for JSON Event Streams - Höer, Sirko
Design, Implementation and Evaluation of State Dependent Fuzzing - An Approach of Stateful Fuzzing to Improve Code Coverage - Jakobs, Carlo
AresHash: Adaptable Resolution Similarity Hashing - Jüliger, Tim
Automated Behaviour Extraction from Source Code Leaks - Karhoff, Sebastian
Risk Assessment and Analysis of Pseudonymized Data - Krämer, Markus
Privacy-preserving Clustering in the Pseudonymization Tool - Kuchenbuch, Alexander
Analyzing News Articles for Detecting Identity Leaks using NLP - Marliani, Jakob
An Analysis of Energy Consumption Across Different Programming Languages - Ontika, Nazmun Nisat
FuzzFlower - A Usable Visualization of Coverage-Guided Fuzzing - Meyer, Daniel
Utility-driven Pseudonymization for a Flexible Survey Platform - Ouko, Victor
Examining User Beliefs and Expectiations With Software Updates - Pohl, Thorben
Replication: A Password Storage Field Study withe Freelance Developers - Exploring a Student Sample and APIs - Rasgauski, Anna
Security Awareness in an Online Code Revieweing Study on Password Storage
- Rossmann, Felix
Detection of Arbitrary Artifacts in IT Security Awareness Testing Scenarios - Schindler, Frank
Identification of Animals and Characterization of their Behavior in Wildlife Videos using Deep Learning Techniques - Schmidt, Christopher
Using Distributed Scanning to Analyze the Update Behaviour of Web Applications - Schneider, Simon
A Recommendation System for Penetration Test Planning - Schulz, Thorbjörn
Architecture Independent Identification of Input Parsers in Binary Programs - Tolksdorf, Teresa Carolin
The Current State of Users' Security Awareness and Personal Password Management
2019
- Amft, Sabrina
Transferring Two-Factor Authentication Incentives from Gaming to Non-Gaming Contexts - Brenner, Ronald
A Case Study of Update Behavior and Potential Stakeholder Influences in the Field - Buhl, Lennart
Update Deployment Analysis of CMS' by Derived Classification Criteria - Deuter, Johanna
Replication of a Password-Storage Field Study with Freelance Developers - Do Freelancers behave differently within the Context of a Study? - Fazliev, Ruslan
Teachme: Development and Evaluation of a Recommendation System for Research Methods - Gerlitz, Eva
A Freelancer Password-Storage Field Study: Exploring a Convenience Sample - Hartlage, Christian
Design, Implementation and Evaluation of Structure Aware Fuzzing - Das Unfuzzbare fuzzbar machen
- Hartmann, Tobias
Security Event Correlation on Log Event Streams - Hecker, Daniel
Nubeculum - Predicting Targets and Actors of Future Cyber Threats based on Policital Events - Jahangiri, Reza
Development and Evaluation of Usable and Secure Authentication for Smart Home Environments - Karpienski, Marvin
Time-dependent Correlation of Advanced Persistent Threat Clusters - Krah, Christopher
File System Fuzzing Applied to the BSD Operation System Family - Mukkamala, Hari Haran
Generating a Data Set for Evaluating Attack Detection Methods - Najafizadeh, Maryam
A Password-Storage Online Study with Professional Developers - Otte, Alina
A Grounded Theory Study of Security and Privacy Habits in the Physical and Virtual World
- Schäfer, Julia
"...No one can Hack my Mind" Again - Replicating a Study on Security Practices - Shafiei, Freya
A Quantitative Study of Security and Privacy Habits in the Physical and Virtual World - Syal, Sakshi
Alice in Api-Land - A Usability Study of Cryptographic Apis - Theus, Pascua Konstantin
Estimating Angle of Arrival in Indoor Locations on Commodity Wi-Fi Routers with Atheros Chipsets
- Wehner, Martin
Utility-driven Requirement Description of Machine Learning Techniques - Winter, Eugen
A Method to Remotely Detect and Categorize Behaviour in Network Services
2018
- Abolghasemi, Niloofar
Evaluating User Perceptions on Security and Privacy in Ad-Blocking - Alqaderi, Hosam
Development of Object Fusion, Management and Representation Strategy for Static Objects - Barmscheidt, Fabian
On multi-view stategies for CNN-based semantic labeling of 3D point clouds - Bigdeloo, Hengameh
Exploring the Challenges and Choices in Mobile Banking Usage - Das, Debojyoti
Identification of Benign Domains Colliding with Botnet Domains - Doll, Christian
Inference of Patterns for Compromise Indication - Grimm, Jonatan
Segmentation and Yield Estimation of Vine Images using VGG-based Convolutional Neural Networks - Habib, Farhan
Recommender System for Scientific Studies - Häring, Maximilian
How do System Administrators Handle Security Updates? An Analysis of Update Processes, Risks and Challenges - Kaszian, Viktor-Maurits
Mitigating the Effects of Obfuscation in Reverse Engineering using Data Flow Analysis - Kaur, Harjot
A Context Sensing Framework for Field Studies with Mobile Devices - Mohammad, Ahmad Zakaria
Object Detection in Hyperspectral Imaging using Deep Learning - Osipova, Valentina
Decision Support System for Aircraft Stand Assingment - Ouachikh, Mohamed Khalil
Certificate Transparency: Benefits, Limitations and Improvements - Peters, Dirk
On the automated annotation and reconstruction of grape bunches from 3D range data using a pre-trained CNN - Pfeifer, Lorenzo
Measuring Slot Car Performance with Automated Test Runs on Race Tracks - Pourkarimi, Sahar
Modelling and Studying Context in Lab for Authentication on Mobile Devices - Qureshi, Mubashir Mehmood
Secure Multiparty Computation of the Median in a Star-Network - Samuel, Konstantin
Disassembling of Flat Binaries - Schiffer, Paul
Kategorisierung von Strings aus Binary Large Objects - Schwenzfeur, Daniel
Enhancing ILDA Digital Network Switcher Usability with Service Discovery - Siebert, Nils
Operating System Fingerprinting - Techniques and Countermeasures - Stark, Christian
Discovering Similar Industrial Control Systems in Internet-wide Scan Data Using Unsupervised Machine Learning - Trockel, Patrick
Recognition of Attackers in the Context of Honeypots - Tulbure, Klaus
Recovering C++ Class Hierarchies from Binary Code - Weber, Daniel
Performance Evaluation of Multipath TCP Scheduling Strategies in Heterogenous Networks for Disaster Operations - Zies, Maik
Customizable Recording and Streaming of distributed Multimedia applied to the ILDA Digital Network
2017
- Andiel, Jan-Phil
Automatisierung der Analyse von Firmware auf Verwundbarkeiten - Bruckschen, Philipp
A Distance Measure Between Labeled Trees Using Frequent Subtree Mining And Graph Kernels - Eissa, Omar
Security Analysis of Autonomic Networking on Cisco Gear - Haubrich, Marcel
Evaluation of Feature-Based Methods for Wideband Signal Detection - Herzog, Marco'
Automatic Attack Traffic Generation for the Evaluation of Flow-based Network Intrusion Detection - Kang, Che-Hao
Behavioral Extraction for Malware Detection - Recognize Malware Behavior Through Machine Learning - Krause, Tim
Email Spam Classification Based on Meta Data - Lenz, Christopher Christian
Model-based 3D Reconstruction of Grape Clusters - Muszynska, Maria
Improving Risk Communication to Support Users in Security and Privacy Decisions through Personalized Runtime Permission Dialogs - Ohm, Marc-Philipp
Intelligence-Driven Alert Generation for Intrusion Detection - Rudolph, Robert
Segmentation and Estimation of Vine Inflorescence using Convolutional Neural Networks
- Rybalka, Mariia
DNS-Based Detection of Malicious Infrastructures on the Internet - Shenoy, Giridhar
Development of a Framework for Efficiency Analysis in Distributed Systems - Stucke, Jörg
Improved Automated Software Signature Generation - Tahaei, Mohammad
Analyzing Banking Technology Usage & Security Perceptions in a Cross-Cultural Context - Wilkinghoff, Kevin
Neural Networks in Speaker Identification - Yilmaz, Tayfun
Streaming Algorithms for Flow-based Data Exfiltration Detection - Zemanek, Sven
Embedded Certificate History: Augmenting Trust in X.509 Certificates
2016
- Abera, Tigist Assefa
Control-Flow Attestation for Embedded Systems Software - Al-Akkad, Manal
Data Appearances for Privacy-Preserving Data Analysis - Amayri, Ahmad
Recovery of Function Interfaces from Binary Code - Bergmann, Niklas
Clustering Malware Based on Header Data and Statistical Features - Danilova, Anastasia
How to Conduct Expert Studies to Measure API Design Influence on Secure Crypto Library Usage - Hilgert, Jan-Niclas
Evaluating the Contemporary Applicability of the Standard Model for File System Forensic Analysis - Hordiienko, Pavlo
A Malware Classification System Based on Structural Static Analysis - Hossain, Mohaimen
Advanced Multi Sensor Track Extraction in a Distributed System - Jenke, Thorsten
Robust Malware Unpacking - An Approach to Robust and Generic Malware Unpacking - Khan, Muhammad Hammad
Increasing User Awareness for Genomic Privacy
- Khoramshahi Bayat, Ali
Approaches for Anomaly Detection in Network Data - Lang, Simon
Implementation of a Behaviour Anlaysis Framework for Proprietary Android Apps - Moerov, Andrey
Design, Implementation and Evaluation of a Statistical Approach for Network Anomaly Detection - Naiakshina, Alena
Conducting Expert Studies to Measure API Design Influence on Secure Password Storage - Neff, René-Julian
Infrastructure Provisioning for Human Penetration Testing - Plöger, Stephan
Cross-Architecture Extraction of Binary Code - Sapunji, Alexandr
Relationship Analysis by Learning from Mobile Communication Data - Shah, Zubair
Target Existence Probability Based on Distributed Kalman Filter - Singh, Vikramjit
Decentralized Community Detection in Unstructured Networks by Dynamic Processes - Sveinsdottir, Asta
Multiple-F0 Estimation in Polyphonic Music Using Shift-Autocorrelation - Taktakidze, Edgar
Slope as visual encoding feature for BAS sensor data - Urrigshardt, Sebastian
A Preprocessing Method for Speech/Non-Speech Classification - vom Dorp, Johannes
Qualitative Benchmarking of Malware Classification Techniques Using System Call Traces
2015
- Ebna Kawsar, Mohiuddin
Notify TOR User About Quantum Insert Attack - Gneba Akpale Kedy, Francis
Feasibility of S/MIME Certificate for Certificate Transparency - Iarovyi, Dmytro
Finding Applied Cryptography Vulnerabilities with Code Property Graphs - Janai, Joel
Tracking of Arbitrary Objects in 3D Laser Range Data - Joukhadar, Basheer
Extracting Structured Information from Cell Phone Usage based on Signal Processing Techniques - Konrad, Marcel
Conception, Implementation and Evaluation of a Secure Deletion Mechanism for Sensitive User Data in Main Memory - Kovalov, Ruslan
Implementing the Gossipping Protocol for Certificate Transparency on Additional Channels - Manyugin, Ilya
An Opportunistic Distributed Collaborative Mechanism for Location Privacy Preservation in Mobile Participatory Sensing - Meiling, Matthias
Coupling the Sensor Data Transmission and Management Protocol with an End-to-End Congestion Control Mechanism - Rump, Fabian
Using Probabilistic Routing to Mitigate the Hotspot Problem in MANETs - Seyidov, Mirsattar
Towards practicable forward secrecy in asynchronous environments
2014
- Ayan, Sinan
Untersuchung und Erkennung fortgeschrittener Persistenzmechanismen bei aktueller Malware - Guevara Lazo, Ana Laura
Semantic Exploration of Binaries - Haidar, Sami Moussa Sleiman
Nichtnegative Matrixfaktorisierung - Quantitative Analyse einiger Verbesserungen des Basis-NMF-Algorithmus - Hamdorf, Sebastian
Konzeption der Benutzeroberfläche einer forensischen Analysesoftware anhand ergonomischer Designprinzipien - Hoffmann, Folker
Radar Resource Management for the Search Function - Kaur, Jaspreet
Countering Covert Channel-internal Control Protocols with Covert Channel-internal Control Protocols - Khanna, Ankush
Authentication Mechanisms in Wireless Sensor Networks with Node Compromise to Observe Railway Facilities - Lüders, Christoph
Fast Multiplication of Large Integers: Implementation and Analysis of the DKSS Algorithm - Ofner, Simon
Cross-Platform Implementation and Evaluation of the Proposed ILDA Digital Network (IDN) Protocol
- Negi, Shirish
Evaluation and Optimization of IDP-MIKE-System over VHF Data Links
- Pauksztelo, Piotr
Simulation of an Enterprise Network with Realistic User Behaviour - Raikar, Harshit
Membership Handling in a Group Key Management after Network Failure or Crash - Xu, Ruofan
Hypervisor-Level Malware Analysis
2013
- Bartelt, Tobias
Verbesserung der Skalierbarkeit der Nachbarschaftserkennung des Optimized Link State Routings in Mobilen Ad Hoc Netzwerken - Braß, Christoph
Implementierung und Evaluation von Netzwerksicherheitsverfahren mit OpenFlow in Software-Defined Networks - Damman, Julian
Asynchronous Tracking of Peer-to-Peer Botnets - Domnich, Roman
Konzeption eines Simulationsmodells zur Leistungsbewertung von ARM-Systemen - Heupel, Daniel
Automatisiertes Patchmanagement - Huang, Jianping
Network-based Classification of Application Behaviours - Kirchhoff, Jonathan
Quality of Service Routing with the Optimized Link State Routing Protocol in MANETs using Multiple Metrics - Koch, Jonathan
Identification of Functions by Symbolic Execution - Lambertz, Martin
Parallel File Carving for Fragmented JPEG Files - Mohammadi, Alireza
Evaluation of the Relevance of the Source IP Address for Collected Malware
- Qasem, Mohammad Iyad A.
A Compression Algorithm for Instructions Trace Files - Ritter, Markus
Generische Erkennung von VM-Packern - Schmid, Marc Oliver
Simulativer Vergleich von Multicast Routing-Protokollen für Sprachkommunikation in MANETs - Sheikh, Ahsan Nazir
Note Carrier: A Nomadic Application for Bi-Directional Class-Room Communication - Varela, Macarena
Computer Aided Dislocation of a Passive Radar System Using Intelligent Information Service - Weidenbach, Peter
Ähnlichkeitsklassifikation von Funktionen auf Basis des Dekompilats
2012
- Grathwohl, Steffen
Erkennung von Anomalien über ein Automatenmodell des Hostverhaltens - Jopen, Sascha
Erweiterung des Optimized Link State Routing Protocol für heterogene, multi-topologie MANETs - Mertens, Christian
Entwicklung eines Verfahrens zur Gruppierung von Honeypot-Angriffsdaten nach Meta-Daten - Niewiejska, Julia
Applikationsbezogene Evaluation von Multimedia-Daten in mobilen Mesh-Netzwerken - Schier, Sebastian
Design and Evaluation of Rushing Detectors in Wireless Sensor Networks - Schneider, Tim
Advanced Retransmission Algorithms for Semi-Reliable Transmission of Sensor Data - Thomaidis, Hristoforos
Entwurf und Evaluation eines Werkzeugs zur Messung mobilfunkspezifischer Parameter - Ul Huda, Zia
Automatic Classification, Analysis, and Evaluation of MOAS Conflicts
2011
- Barabosch, Thomas
An Extraction Framework for Current Malware's Mute Generating Algorithms - Benden, Andreas
Entwicklung und Evaluation eines Frameworks zum Generischen Entpacken von Malware mittels Dynamic Binary Translation - Bochem, Andreas
Erstellung von Verkehrsprofilen in lokalen Netzen - Chapman, Jonathan
Emulative Evaluation of a Multimodal Approach for Detecting Routing Attacks in MANETs - George, Johns
Implementation and Evaluation of Different Energy Efficient Strategies on OLSR Driven Real Mobile Ad-Hoc Networks - Yakdan, Khaled
Decompilation
2010
- Berndt, Thomas
Insuring secure communication on arbitrary GSM phones by applying strong cryptography - Bothe, Alexander
Erweiterung, Trace-basierte Validierung und Evaluation von realistischen Bewegungsmodellen für Rettungsdienstszenarien - Eschweiler, Sebastian
Recognition of Statically Linked Libraries in Executables - Gassen, Jan
Effizientes Malware Clustering auf Basis statischer Analyse - Klein, Christian
Local Positioning System im Lagerhausbetrieb - Peter, Robert
Entwicklung einer Methode zur Eingabeklassenerkennung für mobile Applikationen
- Scheer, Nicolai
Performance- und Sicherheitsaspekte von Anycast in IP-Netzen
2009
- Bauer, Jan
Adaption und simulative Evaluierung terrestrischer ad-hoc Routing-Protokolle für akustische Unterwasser-Netzwerke - Bieling, Jakob
Fast linear constraint checking through the use of GPGPU - Bollmann, Fritz
Kombination und Detektion von Angriffen gegen MANETs bei Verwendung einer linkqualitätsbasierten Routingmetrik - Hunke, Simon
Evaluation von Lernverfahren zur Bewertung der Gefahrenlage im Internet - Lüke, Thomas
Ein adaptives Verfahren zum Online-Angriffsclustering - May, Michael
Untersuchung und Modellierung flussbasierter Datenübertragungen in der TV-Produktion und Ableitung von Netzwerkreservierungscharakteristika - Mehlem, Raja
Bewegungsverfolgung von Fußgängern mit Trägheitssensoren - Plohmann, Daniel
Parallele Simulation drahtloser Mesh-Netze - Rosenthal, Daniel
Leistungsbewertung von TOGBAD im Vergleich mit alternativen Datensätzen - Steinbock, Bastian
Detection of Metamorphic Malware Using Value Set Analysis - Voß, Andreas
Effiziente Synchronisation bei der parallelen Simulation Mobiler Ad-hoc-Netzwerke - Zimmermann, Alexander
Bewertung von Ausfallmechanismen für Advance Reservations in leitungsvermittelten Netzen mit Switching-Restriktionen