Theses and Projects: Difference between revisions

From NET Wiki
Jump to navigation Jump to search
No edit summary
Line 43: Line 43:
* [[Mining emotion patterns in online social networks]] (B/M/P)([http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang])
* [[Mining emotion patterns in online social networks]] (B/M/P)([http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang])
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)
* [[Understanding the information propagation process in social networks]] (B/M/P)
* [[Privacy protection in social network applications]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Privacy protection in social network applications]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Mobile effects in online social networks]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])
* [[Mobile effects in online social networks]] (B/M/P) ([http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu])

Revision as of 11:01, 8 October 2014

Open Theses and Student Project Topics

The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.

  • (B) Bachelor thesis
  • (M) Master thesis
  • (P) Student project


Future Internet architecture

Data Crawling and analysis

Mobile Networking

  • if you are interested in other topics in this area please get in contact with Yuan Zhang-->

Social Networking

Device-free recognition from RF-signals

Context-based security for mobile devices

Mathematical calculations using superimpositions on the RF-channel

Mobile, Pervasive and Ubiquitous Computing

Ongoing Topics

Social Network Architectures

  • Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
  • Supervised by David Koll

Completed Topics

  • Implementation and Deployment of a Measurement Prototype for Decentralized OSNs (P) (supervised by David Koll)
  • GEMSTONE goes Mobile (B) (supervised by David Koll)
  • Transitioning of Social Graphs between Multiple Online Social Networks (B) (supervised by David Koll)
  • Prevention and Mitigation of (D)DoS Attacks in Enterprise Environments (B) (supervised by David Koll)
  • For a full list of older topics please go here.