Theses and Projects: Difference between revisions

From NET Wiki
Jump to navigation Jump to search
(b)
Line 29: Line 29:
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)
* [[Understanding the information propagation process in social networks]] (B/M/P)
* [[Understanding the information propagation process in social networks]] (B/M/P)
* [[Privacy protection in social network applications]] ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Privacy protection in social network applications]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Mobile effects in online social networks]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or Dr. [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Wenzhong Li]
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or Dr. [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Wenzhong Li]



Revision as of 14:24, 10 July 2013

Open Theses and Student Project Topics

The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.

  • (B) Bachelor thesis
  • (M) Master thesis
  • (P) Student project


Mobile Networking

  • if you are interested in other topics in this area please get in contact with Yuan Zhang-->

Cloud Computing and Distributed Systems

  • If you are interested in doing projects in this field, please contact Lei Jiao directly.

Social Networking

Ongoing Topics

Social Network Architectures

  • Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
  • Supervised by David Koll

Social Network Analysis

Network Security

  • Prevention and Mitigation of (Distributed) Denial of Service Attacks in Enterprise Environments (B)
  • Supervised by David Koll

Completed Topics