List of Master and Diploma Theses


  • Katibeh, Kaywan
    Hertzbleed Attacks: Analysis on Capabilities as Side and Covert Channels
  • Kühnemann, Pascal
    Applicability of Data - Flow Stitching to Modern Linux
  • Ruhland, Lucca
    On Systematic Soundness Testing of Static Binary Analysis - A Proof-of-Concept Implementation for the CWE_Checker
  • Sokolowska, Marta Dorota
    Comparison of Cloud Computing Ecosystems from Behavioral Security Perspective


  • Afshar, Bita
    Usable Security and Privacy End User Assessment Metric Review
  • Auler, Nils
    Application of Multipath-TCP in a Tactical Scenario
  • Basse, Alexander
    Platform and Library Agnostic TLS Key Material Identification in Memory Dumps
  • Fasaye, Henry
    Graphical User Interface for AI-guided Fuzzers
  • Goos, Tim
    Another Kind of Supply Chain: Stack Overflow Snippets
  • Grohs, Julia Angelika
    Usability and Classification of 2FA Recovery Methods
  • Hein, Lennart
    Only Trust Yourself - Defending a Virtual Machine Against Co-Hosted Microarchitectural Attacks
  • Karaman, Hüseyin
    An Evaluation of Open-Source Search Engines for Digital Forensics
  • Khan, Mohammad Asif Irfan
    Development of a performance test system for F-PKI with evaluation of F-PKI with it
  • Hoffmann, Melina
    Linking Online and Offline Identity Profiles for Future Fraud Protection
  • Kempf, Lukas
    Topology-Based Intrusion Detection for Malware in Homogenous Windows Networks
  • Kree, Lukas
    A Case Study on Discovering Common Web Vulnerabilities in Open Source PHP Applications Using Automated Semantic Code Analysis
  • Lin, Heng-Yi
    Fuzzing Java Programs with Jazzer
  • Lippmann, Evelyn und Vellmer, Tim
    Performance of LVI Mitigations Based on Intel x86 Architecture Regarding non-SGX Environments
  • Marks, David
    Fireformer: A Modular Two-Branch Video Transformer for Wildfire Prediction
  • Martius, Florin
    Do Students Contribute? Identifying Student Motivation and Barriers in Contributing to Open Source Software
  • Melchers, Marcel
    Cryptographic Function Identification using Machine Learning
  • Mikus, Philipp
    Machine Learning Techniques for Improved Calibration of Dual-Polarized Antenna Arrays
  • Mwangase, Isunge
    Overview of Usability in Usable Security User Studies
  • Nagy, Daniel
    Filtering Internet Background Noise from Network Captures
  • Nesaei Mosaferan, Dastan
    Offensive and Defensive Methods for eBPF-based Linux Rootkits - Implementation of an eBPF Rootkit & Memory Forensics Plugin
  • Pietz, Jodie
    Corporate Risk Awareness Regarding Identity Theft and Account Takeover
  • Preetha, Punya Parvathy
    Improving Interactive Question Answering Systems Over Knowledge Graph
  • Rahman, Mushfiqur
    Adoption of Security Analysis Tools: Developer's Perspective
  • von Rechenberg, Merlin
    Directed Linux Kernel Fuzzing: Improving the Debugging Process for Reported Kernel Crashes
  • Schessler, Maxim
    Integrating Google's Oss-Fuzz in a SBFL Analysis Pipeline
  • Schmetau, Edgar
    Secure Distributed Sensor Networks for Device Location Tracking
  • Spieß, Florian
    Aerial Monte Carlo Localisation with Image Patch Descriptors
  • Sterzenbach, Nicolas
    Study of User Behavior Regarding Update Messages from Security Perspective
  • Stuke, Charlene
    Detection of Malicious Packages with Automaticlly Generated Semgrep Rules
  • Tasch, Sebastian
    IDN-Android-Viz: Development and Evaluation of an IDN Visualization App
  • van den Bosch, Mauritz
    Static detection of Uninitialized Variables in Linux Binaries
  • Vierthaler, Johann Sebastian
    Ways of Getting the (in-)secure Answer - Evaluating the Solution Seeking Behavior of Software Developers for Security Related Topics
  • Werberich, Elias
    Evaluation of Distributed Network Emulation Using EMANE in a Containerized Environment
  • Wilkat, Tobias
    A Critical Analysis of Methods to Learn Vulnerable Code Patterns Based on CVE Patch Data


  • Aljabr, Somar
    Meaning of Effect Sizes
  • Aminian, Armin
    How to specify IPTables rules via GraphML in WireGuard networks - WGEasywall: A tool for managing WireGuard networks and IPTables
  • Aqash, Mirza Muhammad
    JACOZER: Coverage Guided Concurrency Fuzzing of Java Applications
  • Aytekin, Orhan
    Performance Evaluation of Candidate State-of-the-Art Pseudonymization Functions
  • Betke, Felix
    Evaluation of Meltdown-type Attacks on Intel SGX
  • Bungartz, Christian
    Topology-Based Intrusion Detection for Homogeneous IoT Devices - Reproducable Generation of Diverse IDS Datasets
  • Erem, Cüneyt
    Improving Let's Hash: Development of a website helping developers with security-related programming tasks
  • Gehlen, Joshua
    On Advanced Methods for Tensor-Based State Estimation
  • Gottwald, Apolonia
    Simulations for the Practical Usability of Quantum Communications Networks
  • Hakoupian, Alina
    Categorization, Detection and Analysis of Android Malware in a Forensic Context
  • Jin, Niu
    Reserach of citizens' attitudes towards national surveillance implemented by agencies in China in different situations
  • Keienburg, Cedric Manuel
    Leveraging crowd-sourced knowledge for automatic target annotation to effectively guide fuzzing campaigns
  • Kizilkaya, Bilal
    How are people influenced by Open Source - Identification of Misconceptions with a user based study
  • Kremeyer, Tobias Andreas Stephan
    Analysing the Current IoT Threat Landscape Using Honeypots
  • Kutzner, Joris
    Evaluating the Efficacy of Signature Scanning in Live Memory
  • Liessem, Simon
    Hooking Based Unpacker
  • Löhr, Marvin
    Fidelity of Intermediate Representations of Assembly Code
  • Mertens, Anne Sophia
    Developer's Mental Models of Security Threats
  • Oßwald, Florian Konrad
    Towards Metric Monocular Depth Estimation from the Bird's Eye View
  • Pohl, Timo
    Dynamic Capability Reduction to Create Resilience against Malicious Software Updates
  • Römer, Leon
    Reinforcement learning in ad-hoc networks with authentication mechanisms based on key-insulated signatures
  • Scheffczyk, Jan
    Introducing the component coreference resolution task for requirement specification
  • Scherer, Paul
    A Comparison of Alert Prioritsation Methods in SOCs
  • Sergeev, Aleksandr Sergei
    Quantifying Robustness in Tactical Networks using Reinforcement Learning
  • Stachura, Arkadiusz Marcin
  • Fingerprinting Biomechanical Characteristics of Keystrokes
  • Stavrou, Ioannis
    Design and Implementation of an Environment for the Analysis of MANET Routing Protocol Performance
  • Suleman, Sherwan
    Funktionsweise und Verbreitung von TLS 1.3
  • Tauchert, Sebastian
    Building and Evaluating Browser and Static Site Generator Plug-Ins for Hash-Based Content Verification
  • Tsang, Chih-Teng
    Studying the Acceptance and Privacy Concerns of Physical and Virtual Government Surveillance in Taiwan compared to Germany
  • Wani, Mohammad Saalim
    An Investigation of 5G non-stand-alone Vulnerabilities
  • Wilms, Leo
    How May Explainable Artificial Intelligence Improve IT Security of Object Detction?
  • Zißner, Philipp
    Traffic Model based on Heterogeneous Data Fusion to support Intelligent Transportation Systems


  • Akhmedjanov, Ulugbek
    Implementation and Evaluation of the Bluetooth Frequency Hopping Mechanism as Covert Channel Technique
  • Aljallad, Shaker
    Quantum Resistant Authentication in TLS 1.3 Using Mixed X.509 Certificate Chains
  • Altaf, Asif
    Payment Usability and Perceived Security - An Empirical Study of Payment Method Perception and Adoption in Pakistan
  • Beckert, Karla
    Detecting Recent Identity Leaks in News Articles using Modern Machine Learning Methods
  • Bilstein, Felix
    Capability Analysis on Malicious Software
  • Blatt, Manuel
    Analysis of Code Reuse and Obfuscation in .NET Malware
  • Franz, Benjamin Tobias
    Introducing a Global OS Privacy Dashboard – Including an Evaluation of Users’ Perceptions, Attitudes, and Needs Regarding History Data
  • Geierhaas, Lisa
    LetsHashSalt - Design of a Website Helping Developers with Secure User Password Storage and Authentication
  • Gerlach, Thore
    Knowledge Gradient for Policy Rollout Algorithms
  • Großmann, Jonas
    Efficient, Accurate and Fault Tolerant Parsing of Leaked Identity Records
  • Härig, Julian
    Improving Automated Debugging
  • Handke, Sebastian Thomas
    Mission Planning for Passive Radar - Optimization for Multiple Receivers and Technologies
  • Haubold, Sven
    Stealth Attacks on Integrated Bridge Systems
  • Hennies, Arne
    Detection and Recognition of WordPress Plugins and Themes by Patterns and Fingerprints
  • Höltervennhoff, Sandra
    Examining the Effect of Bonus Payment on Code Security in a Developer Study
  • Horstmann, Stefan
    Designing and Evaluating an Instrument for Identifying Software Developers in Online Questionnaires
  • Klimke, Melvin
    Evaluation of C-String Abstract Domains on Router Firmware
  • Krebs, Steffen
    Clustering Text-Based Logs with an Empirical Offline Approach
  • Krestel, Markus
    Sensor Path Planning for Multi-Emitter Localization using Policy Rollout
  • Kropp, Maxim
    Contribution to the Development of an Official File Standard for IDN Laser Data
  • Lackner, Arthur
    What Influences User Trust in a Contact Tracing App?
  • Leuschner, Oliver
    Using Machine Learning Methods for System Activity Detection in Functional Requirements
  • Loevenich, Johannes
    A Stochastic Uncertainty Model to Measure and Improve the Robustness of Tactical Systems in Ever-Changing Communication Scenarios
  • Maligera Eswarappa, Sharath
    Adaptive QoS in SDN-Enabled Heterogeneous Mobile Tactical Networks
  • Mateyna, Anna-Mariya
    Analyzing and Evaluating Apple Operating System Artifacts for Forensic Purposes
  • Meneghetti, Roland
    Trust Certificates through your Smartphone - Analysing and Implementing a Proof of Concept to Certificate Validation via Smartphone
  • Müller, Andreas
    Automatic Generation of JavaScript Fuzzing Targets
  • Noack, Phil-Tabeas
    Black-Box Impersonation Attacks Against an ID Document Photo to Selfie Matching AI
  • Polewcyk, Joanna
    Aircraft Trajectory Prediction and Time Estimation Adapting Social LSTM
  • Prämaßing, Jonas
    Portable Data Collection Framework and Analysis of Automated Authorization Attempts
  • Prahl-Kamps, Maximilian
    A Method for Analysis and Real-Time Emulation of IP Radios
  • Reiter, Alexander
    Using Code Analysis to Find Malicious Projects on PyPl
  • Retzmann, Simon
    An Analysis of the Docker Ecosystem in Practice
  • Röth, Konstantin Norbert
    Forensic Analysis of Distributed File Systems - MooseFS as a Case Study
  • Schell, Roman
    Digging for Artifacts in Process Memory
  • Schenk, Kai
    Malicious Domain Classification using Machine Learning
  • Schiffer, Paul
    Distribution of Security-critical Bugs in Open Source C Projects
  • Schröter, Felix
    Use RIPE ATLAS Data to Investigate Prefix Hijacking Partitions
  • Serafini, Raphael
    Merit of a Digital Solution for the Prevention of Door-Step-Scams
  • Singh, Kainaat
    Fuzzing Intel Graphics Drivers Using Syzkaller and KAFL: A Comparative Analysis
  • Sorgatz, Christian
    Security in Public Code Repositories: Mitigating Typosquatting Attacks Using Namespaces
  • Swierzy, Ben
    WiFi Indoor Localization Systems based on Signal Strength and their Calibration
  • Tennié, Jonas
    Change Drift: Anomaly Detection Based on Divergent Behaviour of Homogeneous IoT Devices
  • Ufer, Max
    Algorithmic Heap Layout Manipulation in the Linux Kernel
  • Waffenschmidt, Pascal
    A Threat Intelligence System for Detecting Recent Identity Leaks - User Interface and Framework Development


  • Abediyarandi, Neda
    Code Reviewing as a Methodology for Investigating the Security of JDBC Against SQL Injection
  • Ahmadi, Farzaneh
    Semi-Automated Fuzz Target Generation For Java
  • Batenipour, Negar
    Understanding the Conception of Password Policies: A Qualitative Approach
  • Fano, Andy
    Optimizing Kubernetes Cluster Performance
  • Hackländer, Aaron Lee Louis
    Optimized Rule Processing and Regular Expression Matching for JSON Event Streams
  • Höer, Sirko
    Design, Implementation and Evaluation of State Dependent Fuzzing - An Approach of Stateful Fuzzing to Improve Code Coverage
  • Jakobs, Carlo
    AresHash: Adaptable Resolution Similarity Hashing
  • Jüliger, Tim
    Automated Behaviour Extraction from Source Code Leaks
  • Karhoff, Sebastian
    Risk Assessment and Analysis of Pseudonymized Data
  • Krämer, Markus
    Privacy-preserving Clustering in the Pseudonymization Tool
  • Kuchenbuch, Alexander
    Analyzing News Articles for Detecting Identity Leaks using NLP
  • Marliani, Jakob
    An Analysis of Energy Consumption Across Different Programming Languages
  • Ontika, Nazmun Nisat
    FuzzFlower - A Usable Visualization of Coverage-Guided Fuzzing
  • Meyer, Daniel
    Utility-driven Pseudonymization for a Flexible Survey Platform
  • Ouko, Victor
    Examining User Beliefs and Expectiations With Software Updates
  • Pohl, Thorben
    Replication: A Password Storage Field Study withe Freelance Developers - Exploring a Student Sample and APIs
  • Rasgauski, Anna
    Security Awareness in an Online Code Revieweing Study on Password Storage
  • Rossmann, Felix
    Detection of Arbitrary Artifacts in IT Security Awareness Testing Scenarios
  • Schindler, Frank
    Identification of Animals and Characterization of their Behavior in Wildlife Videos using Deep Learning Techniques
  • Schmidt, Christopher
    Using Distributed Scanning to Analyze the Update Behaviour of Web Applications
  • Schneider, Simon
    A Recommendation System for Penetration Test Planning
  • Schulz, Thorbjörn
    Architecture Independent Identification of Input Parsers in Binary Programs
  • Tolksdorf, Teresa Carolin
    The Current State of Users' Security Awareness and Personal Password Management


  • Amft, Sabrina
    Transferring Two-Factor Authentication Incentives from Gaming to Non-Gaming Contexts
  • Brenner, Ronald
    A Case Study of Update Behavior and Potential Stakeholder Influences in the Field
  • Buhl, Lennart
    Update Deployment Analysis of CMS' by Derived Classification Criteria
  • Deuter, Johanna
    Replication of a Password-Storage Field Study with Freelance Developers - Do Freelancers behave differently within the Context of a Study?
  • Fazliev, Ruslan
    Teachme: Development and Evaluation of a Recommendation System for Research Methods
  • Gerlitz, Eva
    A Freelancer Password-Storage Field Study: Exploring a Convenience Sample
  • Hartlage, Christian
    Design, Implementation and Evaluation of Structure Aware Fuzzing - Das Unfuzzbare fuzzbar machen
  • Hartmann, Tobias
    Security Event Correlation on Log Event Streams
  • Hecker, Daniel
    Nubeculum - Predicting Targets and Actors of Future Cyber Threats based on Policital Events
  • Jahangiri, Reza
    Development and Evaluation of Usable and Secure Authentication for Smart Home Environments
  • Karpienski, Marvin
    Time-dependent Correlation of Advanced Persistent Threat Clusters
  • Krah, Christopher
    File System Fuzzing Applied to the BSD Operation System Family
  • Mukkamala, Hari Haran
    Generating a Data Set for Evaluating Attack Detection Methods
  • Najafizadeh, Maryam
    A Password-Storage Online Study with Professional Developers
  • Otte, Alina
    A Grounded Theory Study of Security and Privacy Habits in the Physical and Virtual World
  • Schäfer, Julia
    "...No one can Hack my Mind" Again - Replicating a Study on Security Practices
  • Shafiei, Freya
    A Quantitative Study of Security and Privacy Habits in the Physical and Virtual World
  • Syal, Sakshi
    Alice in Api-Land - A Usability Study of Cryptographic Apis
  • Theus, Pascua Konstantin
    Estimating Angle of Arrival in Indoor Locations on Commodity Wi-Fi Routers with Atheros Chipsets
  • Wehner, Martin
    Utility-driven Requirement Description of Machine Learning Techniques
  • Winter, Eugen
    A Method to Remotely Detect and Categorize Behaviour in Network Services


  • Abolghasemi, Niloofar
    Evaluating User Perceptions on Security and Privacy in Ad-Blocking
  • Alqaderi, Hosam
    Development of Object Fusion, Management and Representation Strategy for Static Objects
  • Barmscheidt, Fabian
    On multi-view stategies for CNN-based semantic labeling of 3D point clouds
  • Bigdeloo, Hengameh
    Exploring the Challenges and Choices in Mobile Banking Usage
  • Das, Debojyoti
    Identification of Benign Domains Colliding with Botnet Domains
  • Doll, Christian
    Inference of Patterns for Compromise Indication
  • Grimm, Jonatan
    Segmentation and Yield Estimation of Vine Images using VGG-based Convolutional Neural Networks
  • Habib, Farhan
    Recommender System for Scientific Studies
  • Häring, Maximilian
    How do System Administrators Handle Security Updates? An Analysis of Update Processes, Risks and Challenges
  • Kaszian, Viktor-Maurits
    Mitigating the Effects of Obfuscation in Reverse Engineering using Data Flow Analysis
  • Kaur, Harjot
    A Context Sensing Framework for Field Studies with Mobile Devices
  • Mohammad, Ahmad Zakaria
    Object Detection in Hyperspectral Imaging using Deep Learning
  • Osipova, Valentina
    Decision Support System for Aircraft Stand Assingment
  • Ouachikh, Mohamed Khalil
    Certificate Transparency: Benefits, Limitations and Improvements
  • Peters, Dirk
    On the automated annotation and reconstruction of grape bunches from 3D range data using a pre-trained CNN
  • Pfeifer, Lorenzo
    Measuring Slot Car Performance with Automated Test Runs on Race Tracks
  • Pourkarimi, Sahar
    Modelling and Studying Context in Lab for Authentication on Mobile Devices
  • Qureshi, Mubashir Mehmood
    Secure Multiparty Computation of the Median in a Star-Network
  • Samuel, Konstantin
    Disassembling of Flat Binaries
  • Schiffer, Paul
    Kategorisierung von Strings aus Binary Large Objects
  • Schwenzfeur, Daniel
    Enhancing ILDA Digital Network Switcher Usability with Service Discovery
  • Siebert, Nils
    Operating System Fingerprinting - Techniques and Countermeasures
  • Stark, Christian
    Discovering Similar Industrial Control Systems in Internet-wide Scan Data Using Unsupervised Machine Learning
  • Trockel, Patrick
    Recognition of Attackers in the Context of Honeypots
  • Tulbure, Klaus
    Recovering C++ Class Hierarchies from Binary Code
  • Weber, Daniel
    Performance Evaluation of Multipath TCP Scheduling Strategies in Heterogenous Networks for Disaster Operations
  • Zies, Maik
    Customizable Recording and Streaming of distributed Multimedia applied to the ILDA Digital Network


  • Andiel, Jan-Phil
    Automatisierung der Analyse von Firmware auf Verwundbarkeiten
  • Bruckschen, Philipp
    A Distance Measure Between Labeled Trees Using Frequent Subtree Mining And Graph Kernels
  • Eissa, Omar
    Security Analysis of Autonomic Networking on Cisco Gear
  • Haubrich, Marcel
    Evaluation of Feature-Based Methods for Wideband Signal Detection
  • Herzog, Marco'
    Automatic Attack Traffic Generation for the Evaluation of Flow-based Network Intrusion Detection
  • Kang, Che-Hao
    Behavioral Extraction for Malware Detection - Recognize Malware Behavior Through Machine Learning
  • Krause, Tim
    Email Spam Classification Based on Meta Data
  • Lenz, Christopher Christian
    Model-based 3D Reconstruction of Grape Clusters
  • Muszynska, Maria
    Improving Risk Communication to Support Users in Security and Privacy Decisions through Personalized Runtime Permission Dialogs
  • Ohm, Marc-Philipp
    Intelligence-Driven Alert Generation for Intrusion Detection
  • Rudolph, Robert
    Segmentation and Estimation of Vine Inflorescence using Convolutional Neural Networks
  • Rybalka, Mariia
    DNS-Based Detection of Malicious Infrastructures on the Internet
  • Shenoy, Giridhar
    Development of a Framework for Efficiency Analysis in Distributed Systems
  • Stucke, Jörg
    Improved Automated Software Signature Generation
  • Tahaei, Mohammad
    Analyzing Banking Technology Usage & Security Perceptions in a Cross-Cultural Context
  • Wilkinghoff, Kevin
    Neural Networks in Speaker Identification
  • Yilmaz, Tayfun
    Streaming Algorithms for Flow-based Data Exfiltration Detection
  • Zemanek, Sven
    Embedded Certificate History: Augmenting Trust in X.509 Certificates


  • Abera, Tigist Assefa
    Control-Flow Attestation for Embedded Systems Software
  • Al-Akkad, Manal
    Data Appearances for Privacy-Preserving Data Analysis
  • Amayri, Ahmad
    Recovery of Function Interfaces from Binary Code
  • Bergmann, Niklas
    Clustering Malware Based on Header Data and Statistical Features
  • Danilova, Anastasia
    How to Conduct Expert Studies to Measure API Design Influence on Secure Crypto Library Usage
  • Hilgert, Jan-Niclas
    Evaluating the Contemporary Applicability of the Standard Model for File System Forensic Analysis
  • Hordiienko, Pavlo
    A Malware Classification System Based on Structural Static Analysis
  • Hossain, Mohaimen
    Advanced Multi Sensor Track Extraction in a Distributed System
  • Jenke, Thorsten
    Robust Malware Unpacking - An Approach to Robust and Generic Malware Unpacking
  • Khan, Muhammad Hammad
    Increasing User Awareness for Genomic Privacy
  • Khoramshahi Bayat, Ali
    Approaches for Anomaly Detection in Network Data
  • Lang, Simon
    Implementation of a Behaviour Anlaysis Framework for Proprietary Android Apps
  • Moerov, Andrey
    Design, Implementation and Evaluation of a Statistical Approach for Network Anomaly Detection
  • Naiakshina, Alena
    Conducting Expert Studies to Measure API Design Influence on Secure Password Storage
  • Neff, René-Julian
    Infrastructure Provisioning for Human Penetration Testing
  • Plöger, Stephan
    Cross-Architecture Extraction of Binary Code
  • Sapunji, Alexandr
    Relationship Analysis by Learning from Mobile Communication Data
  • Shah, Zubair
    Target Existence Probability Based on Distributed Kalman Filter
  • Singh, Vikramjit
    Decentralized Community Detection in Unstructured Networks by Dynamic Processes
  • Sveinsdottir, Asta
    Multiple-F0 Estimation in Polyphonic Music Using Shift-Autocorrelation
  • Taktakidze, Edgar
    Slope as visual encoding feature for BAS sensor data
  • Urrigshardt, Sebastian
    A Preprocessing Method for Speech/Non-Speech Classification
  • vom Dorp, Johannes
    Qualitative Benchmarking of Malware Classification Techniques Using System Call Traces


  • Ebna Kawsar, Mohiuddin
    Notify TOR User About Quantum Insert Attack
  • Gneba Akpale Kedy, Francis
    Feasibility of S/MIME Certificate for Certificate Transparency
  • Iarovyi, Dmytro
    Finding Applied Cryptography Vulnerabilities with Code Property Graphs
  • Janai, Joel
    Tracking of Arbitrary Objects in 3D Laser Range Data
  • Joukhadar, Basheer
    Extracting Structured Information from Cell Phone Usage based on Signal Processing Techniques
  • Konrad, Marcel
    Conception, Implementation and Evaluation of a Secure Deletion Mechanism for Sensitive User Data in Main Memory
  • Kovalov, Ruslan
    Implementing the Gossipping Protocol for Certificate Transparency on Additional Channels
  • Manyugin, Ilya
    An Opportunistic Distributed Collaborative Mechanism for Location Privacy Preservation in Mobile Participatory Sensing
  • Meiling, Matthias
    Coupling the Sensor Data Transmission and Management Protocol with an End-to-End Congestion Control Mechanism
  • Rump, Fabian
    Using Probabilistic Routing to Mitigate the Hotspot Problem in MANETs
  • Seyidov, Mirsattar
    Towards practicable forward secrecy in asynchronous environments


  • Ayan, Sinan
    Untersuchung und Erkennung fortgeschrittener Persistenzmechanismen bei aktueller Malware
  • Guevara Lazo, Ana Laura
    Semantic Exploration of Binaries
  • Haidar, Sami Moussa Sleiman
    Nichtnegative Matrixfaktorisierung - Quantitative Analyse einiger Verbesserungen des Basis-NMF-Algorithmus
  • Hamdorf, Sebastian
    Konzeption der Benutzeroberfläche einer forensischen Analysesoftware anhand ergonomischer Designprinzipien
  • Hoffmann, Folker
    Radar Resource Management for the Search Function
  • Kaur, Jaspreet
    Countering Covert Channel-internal Control Protocols with Covert Channel-internal Control Protocols
  • Khanna, Ankush
    Authentication Mechanisms in Wireless Sensor Networks with Node Compromise to Observe Railway Facilities
  • Lüders, Christoph
    Fast Multiplication of Large Integers: Implementation and Analysis of the DKSS Algorithm
  • Ofner, Simon
    Cross-Platform Implementation and Evaluation of the Proposed ILDA Digital Network (IDN) Protocol
  • Negi, Shirish
    Evaluation and Optimization of IDP-MIKE-System over VHF Data Links
  • Pauksztelo, Piotr
    Simulation of an Enterprise Network with Realistic User Behaviour
  • Raikar, Harshit
    Membership Handling in a Group Key Management after Network Failure or Crash
  • Xu, Ruofan
    Hypervisor-Level Malware Analysis


  • Bartelt, Tobias
    Verbesserung der Skalierbarkeit der Nachbarschaftserkennung des Optimized Link State Routings in Mobilen Ad Hoc Netzwerken
  • Braß, Christoph
    Implementierung und Evaluation von Netzwerksicherheitsverfahren mit OpenFlow in Software-Defined Networks
  • Damman, Julian
    Asynchronous Tracking of Peer-to-Peer Botnets
  • Domnich, Roman
    Konzeption eines Simulationsmodells zur Leistungsbewertung von ARM-Systemen
  • Heupel, Daniel
    Automatisiertes Patchmanagement
  • Huang, Jianping
    Network-based Classification of Application Behaviours
  • Kirchhoff, Jonathan
    Quality of Service Routing with the Optimized Link State Routing Protocol in MANETs using Multiple Metrics
  • Koch, Jonathan
    Identification of Functions by Symbolic Execution
  • Lambertz, Martin
    Parallel File Carving for Fragmented JPEG Files
  • Mohammadi, Alireza
    Evaluation of the Relevance of the Source IP Address for Collected Malware
  • Qasem, Mohammad Iyad A.
    A Compression Algorithm for Instructions Trace Files
  • Ritter, Markus
    Generische Erkennung von VM-Packern
  • Schmid, Marc Oliver
    Simulativer Vergleich von Multicast Routing-Protokollen für Sprachkommunikation in MANETs
  • Sheikh, Ahsan Nazir
    Note Carrier: A Nomadic Application for Bi-Directional Class-Room Communication
  • Varela, Macarena
    Computer Aided Dislocation of a Passive Radar System Using Intelligent Information Service
  • Weidenbach, Peter
    Ähnlichkeitsklassifikation von Funktionen auf Basis des Dekompilats


  • Grathwohl, Steffen
    Erkennung von Anomalien über ein Automatenmodell des Hostverhaltens
  • Jopen, Sascha
    Erweiterung des Optimized Link State Routing Protocol für heterogene, multi-topologie MANETs
  • Mertens, Christian
    Entwicklung eines Verfahrens zur Gruppierung von Honeypot-Angriffsdaten nach Meta-Daten
  • Niewiejska, Julia
    Applikationsbezogene Evaluation von Multimedia-Daten in mobilen Mesh-Netzwerken
  • Schier, Sebastian
    Design and Evaluation of Rushing Detectors in Wireless Sensor Networks
  • Schneider, Tim
    Advanced Retransmission Algorithms for Semi-Reliable Transmission of Sensor Data
  • Thomaidis, Hristoforos
    Entwurf und Evaluation eines Werkzeugs zur Messung mobilfunkspezifischer Parameter
  • Ul Huda, Zia
    Automatic Classification, Analysis, and Evaluation of MOAS Conflicts


  • Barabosch, Thomas
    An Extraction Framework for Current Malware's Mute Generating Algorithms
  • Benden, Andreas
    Entwicklung und Evaluation eines Frameworks zum Generischen Entpacken von Malware mittels Dynamic Binary Translation
  • Bochem, Andreas
    Erstellung von Verkehrsprofilen in lokalen Netzen
  • Chapman, Jonathan
    Emulative Evaluation of a Multimodal Approach for Detecting Routing Attacks in MANETs
  • George, Johns
    Implementation and Evaluation of Different Energy Efficient Strategies on OLSR Driven Real Mobile Ad-Hoc Networks
  • Yakdan, Khaled


  • Berndt, Thomas
    Insuring secure communication on arbitrary GSM phones by applying strong cryptography
  • Bothe, Alexander
    Erweiterung, Trace-basierte Validierung und Evaluation von realistischen Bewegungsmodellen für Rettungsdienstszenarien
  • Eschweiler, Sebastian
    Recognition of Statically Linked Libraries in Executables
  • Gassen, Jan
    Effizientes Malware Clustering auf Basis statischer Analyse
  • Klein, Christian
    Local Positioning System im Lagerhausbetrieb 
  • Peter, Robert
    Entwicklung einer Methode zur Eingabeklassenerkennung für mobile Applikationen
  • Scheer, Nicolai
    Performance- und Sicherheitsaspekte von Anycast in IP-Netzen


  • Bauer, Jan
    Adaption und simulative Evaluierung terrestrischer ad-hoc Routing-Protokolle für akustische Unterwasser-Netzwerke
  • Bieling, Jakob
    Fast linear constraint checking through the use of GPGPU
  • Bollmann, Fritz
    Kombination und Detektion von Angriffen gegen MANETs bei Verwendung einer linkqualitätsbasierten Routingmetrik
  • Hunke, Simon
    Evaluation von Lernverfahren zur Bewertung der Gefahrenlage im Internet
  • Lüke, Thomas
    Ein adaptives Verfahren zum Online-Angriffsclustering
  • May, Michael
    Untersuchung und Modellierung flussbasierter Datenübertragungen in der TV-Produktion und Ableitung von Netzwerkreservierungscharakteristika
  • Mehlem, Raja
    Bewegungsverfolgung von Fußgängern mit Trägheitssensoren
  • Plohmann, Daniel
    Parallele Simulation drahtloser Mesh-Netze
  • Rosenthal, Daniel
    Leistungsbewertung von TOGBAD im Vergleich mit alternativen Datensätzen
  • Steinbock, Bastian
    Detection of Metamorphic Malware Using Value Set Analysis
  • Voß, Andreas
    Effiziente Synchronisation bei der parallelen Simulation Mobiler Ad-hoc-Netzwerke
  • Zimmermann, Alexander
    Bewertung von Ausfallmechanismen für Advance Reservations in leitungsvermittelten Netzen mit Switching-Restriktionen