printlogo
ETH Zuerich - Homepage
Computer Engineering and Networks Laboratory (TIK)
 
ETH Zurich - ITET - TIK - Thesis
print
  

Past Theses for Communication Systems

  title category type contact/supervisor assigned student(s) thesis number
Internet-Technologien für die Erhaltung und Verbesserung der Lebensqualität und der Selbständigkeit von älteren Menschen [confidential] S Bernhard Plattner HS 15 SA-2015-72
Context-awareness of Opportunistic radio contacts [confidential] External Projects S Laurent Vanbever,
Bernhard Plattner
HS 15 SA-2015-29
Security and Privacy in Opportunistic Networks [confidential] M Bernhard Plattner FS 15 MA-2015-40
Measuring Explicit Congestion Negotiation (ECN) support based on P2P networks Internet Measurement S Brian Trammell,
Mirja Kühlewind
FS 15 SA-2015-05
A Mission-Aware Routing Algorithm for Micro Aerial Vehicle Networks Networked robotics S Mahdi Asadpour,
Karin Anna Hummel
FS 15 ,
SA-2015-03
Performance Evaluation and Optimization of p2pkit-based Opportunistic Networking [confidential] Peer-to-Peer Networks M Franck Legendre,
Bernhard Plattner
FS 15 MA-2015-36
An Adaptive Hardware/Software Interface for EmbedNet Reconfigurable Computing S Markus Happe FS 15 SA-2015-09
Generic Functional Blocks for FPGA-based Network Nodes Reconfigurable Computing S Markus Happe FS 15 SA-2015-08
Self-Learning Enterprise Networks Via Software Defined Networking [confidential] Software Defined Networking M Panagiotis Georgopoulos,
Laurent Vanbever
FS 15 MA-2015-25
CONTACT: Information Sharing Between Strangers With Hyperlocal Community Wireless Networks [confidential] Ad-hoc-Networks S Panayotis Antoniadis HS 14 SA-2014-44
Analyzing the Time Dynamics in IXP Datasets Internet Measurement S Bernhard Ager,
Vasileios Kotronis
HS 14 SA-2014-43
Early Detection of Real-World Events with Twitter Internet Measurement M Vincent Lenders,
David Gugelmann
HS 14 MA-2014-18
Quantifying Web Personalization Internet Measurement S David Gugelmann HS 14 SA-2014-37
WiFi Based Time-of-Flight Indoor Localization [confidential] Localization M Domenico Giustiniano,
Vincent Lenders
HS 14 MA-2014-15
Smartphone App for Fused Indoor Localization Localization M Vincent Lenders,
Domenico Giustiniano
HS 14 MA-2014-20
Reconstructing HTTPS Activity from Traffic Metadata [confidential] Network Security S David Gugelmann HS 14 SA-2014-38
Flow Embedding Algorithms for Software Defined Audio Networks Software Defined Networking M Panagiotis Georgopoulos,
Vasileios Kotronis
HS 14 MA-2014-14
SDN-assisted IP Multicast Software Defined Networking S Panagiotis Georgopoulos,
Bernhard Ager
HS 14 SA-2014-30
SDN-based Source Address Dilution Service [confidential] Software Defined Networking M Vincent Lenders,
Bernhard Ager
HS 14 MA-2014-12
Theoretical and Empirical Evaluation of UepaaNet`s Scalability [confidential] Wireless Mesh Networks S Bernhard Distl HS 14 SA-2014-27
Jamming Mitigation in Bandwidth Hopping Spread Spectrum Communications [confidential] Wireless Security M Vincent Lenders,
Domenico Giustiniano
HS 14 MA-2014-21
Collaborative Spectrum Monitoring [confidential] M Vincent Lenders,
Domenico Giustiniano
FS 14 MA-2014-07
Avalanche Rescue Beacon with Smartphones [confidential] Ad-hoc-Networks M Franck Legendre,
Bernhard Distl
FS 14 MA-2014-05
Bringing Network Access to Disconnected Regions using DTN Throwboxes Ad-hoc-Networks M Abdullah Alhussainy,
Karin Anna Hummel
FS 14 MA-2014-04
OppNet: An Energy Optimized Service Platform for Opportunistic Networking on Android Ad-hoc-Networks M Sacha Trifunovic FS 14 MA-2014-01
Path Transparency for Explicit Congestion Notification Internet Measurement M Brian Trammell,
Stephan Neuhaus
FS 14 MA-2014-10
Help! My Birthday Reminder Wants to Brick My Phone Network Security M Stephan Neuhaus,
Brian Trammell
FS 14 MA-2014-09
Visualization of HTTP Network Traffic for Digital Forensics [confidential] Network Security S David Gugelmann,
Vincent Lenders
FS 14 SA-2014-12
Designing a Routing Algorithm for UAV Swarms based on Simulation and Measurements [confidential] Networked robotics S Mahdi Asadpour,
Karin Anna Hummel
FS 14 SA-2014-23
Specification, Implementation and Load Test of UepaaNet Cloud Services [confidential] Peer-to-Peer Networks S Franck Legendre,
Bernhard Distl
FS 14 SA-2014-19
TCP Congestion Control on RTP Media Streams Performance Evaluation S Brian Trammell FS 14 SA-2014-15
Resource-efficient Dynamic Partial Reconfiguration on FPGAs Reconfigurable Computing S Markus Happe,
Ariane Trammell
FS 14 SA-2014-17
Detection of GNSS Multipath Errors in Urban Environments [confidential] M Domenico Giustiniano HS 13 MA-2013-21
Telemetry Unit for a Formula Student Race Car S Mahdi Asadpour HS 13 SA-2013-67
Location-Aware Currency for a Social Shopping Game [confidential] External Projects S Sacha Trifunovic HS 13 SA-2013-69
XMPProbe - XMPP Server Monitoring Internet Measurement S Brian Trammell,
Xenofontas Dimitropoulos
HS 13 SA-2013-66
Finding rogue WLAN Access Points [confidential] Localization M Vincent Lenders,
Domenico Giustiniano
HS 13 MA-2013-10
Time-of-Flight WLAN Indoor Tracking System Localization M Vincent Lenders,
Domenico Giustiniano
HS 13 MA-2013-13
Cross-Domain DoS Link-Flooding Attack Detection and Mitigation using SDN Principles Network Security M Vasileios Kotronis,
Xenofontas Dimitropoulos
HS 13 MA-2013-18
Evaluating the Effect of SDN Centralization on Internet Routing Convergence Software Defined Networking M Vasileios Kotronis,
Xenofontas Dimitropoulos
HS 13 MA-2013-19
Policy-based Injection of Private Traffic into a Public SDN Testbed Software Defined Networking M Bernhard Ager,
Vasileios Kotronis
HS 13 MA-2013-12
UepaaNet Testbed, Performance Evaluation and Optimization [confidential] Wireless Mesh Networks M Franck Legendre,
Bernhard Distl
HS 13 MA-2013-07
Bandwidth Hopping Spread Spectrum [confidential] Wireless Security M Vincent Lenders,
Domenico Giustiniano
HS 13 MA-2013-20
Design and Implementation of a GameCenter for Opportunistic Networks G Sacha Trifunovic FS 13 ,
,
GA-2013-05
Messaging Challenges in a Globally Distributed Network M David Gugelmann FS 13 MA-2013-02
WLAN-Opp-based Game: Infectious G Sacha Trifunovic FS 13 ,
GA-2013-06
Intrusion Prevention for Flexible Protocol Stacks Embedded Systems M Ariane Trammell,
Markus Happe
FS 13 MA-2013-04
Investigating the Accuracy of SIFS Time for Time-Of-Flight WLAN Localization [confidential] Embedded Systems S Domenico Giustiniano FS 13 SA-2013-03
Power-line Communication Performance for Peer-To-Peer Mesh Networks in Urban Neighbourhoods Embedded Systems S Domenico Giustiniano FS 13 SA-2013-42
Screen Watermarking for Data Leakage Investigations [confidential] End-point Security M David Gugelmann FS 13 MA-2013-06
Visualizing Dynamics in Frequent Itemset Mining Timeseries Internet Measurement S Bernhard Ager,
Eduard Glatz
FS 13 SA-2013-43
Analysis of Data Leakage over HTTP [confidential] Network Security M David Gugelmann FS 13 MA-2013-03
Supporting Header Field Re-writing for Policy-bound Flows in a Software Defined Network Software Defined Networking S Bernhard Ager FS 13 SA-2013-44
Jamming-resistant Wireless Communication [confidential] Wireless Security M Vincent Lenders,
Domenico Giustiniano
FS 13 MA-2013-01
OppMap: Opportunistic Map and Location Sharing S Sacha Trifunovic HS 12 ,
SA-2012-24
WiFi-based Overflight Localization of Victims [confidential] M Franck Legendre HS 12 MA-2012-16
WLAN-Opp-based Turn-based Strategy Game S Sacha Trifunovic HS 12 SA-2012-28
Real-World Evaluation of Ad Hoc Routing Algorithms Ad-hoc-Networks S Mahdi Asadpour,
Domenico Giustiniano
HS 12 SA-2012-35
Time-of-Flight WLAN Localization [confidential] Ad-hoc-Networks S Domenico Giustiniano HS 12 SA-2012-25
Improved Offline Operation of Twimight Ad-hoc-Networks S Theus Hossmann,
Paolo Carta
HS 12 SA-2012-36
WLAN based Opportunistic Networking Performance Evaluation and Optimization Ad-hoc-Networks M Sacha Trifunovic,
Bernhard Distl
HS 12 MA-2012-31
Hardware Encryption for Embedded Systems Embedded Systems S Ariane Trammell,
Stephan Neuhaus
HS 12 SA-2012-16
Best Practices to Securely Operate Hardware Security Modules in a High Availability Setup External Projects S Stephan Neuhaus HS 12 SA-2012-27
Showing The Way To Alpine Safety [confidential] External Projects S Franck Legendre HS 12 SA-2012-33
OpenFlow: A Security Analysis Network Security M Paul Smith,
Vasileios Kotronis
HS 12 MA-2012-20
Anomaly Detection with Virtual Service Migration in Cloud Infrastructures Network Security M Paul Smith,
Bernhard Plattner
HS 12 MA-2012-17
Reducing Energy Consumption in Hybrid Wireless Communication Wireless Mesh Networks S Karin Anna Hummel,
Franck Legendre
HS 12 SA-2012-22
RFID-powered vending machine G Sacha Trifunovic FS 12 ,
Johannes Suter
GA-2012-01
Local Browsing S Bernhard Plattner FS 12 ,
,
SA-2012-37
Probabilistic Inference in Online Social Networks [confidential] M Vincent Lenders,
Franck Legendre
FS 12 MA-2012-12
A Lightweight Data Dissemination Algorithm for Multi-hop Wireless Networks Ad-hoc-Networks S Mahdi Asadpour,
Karin Anna Hummel
FS 12 SA-2012-09
WLAN-Opp-based RPG Ad-hoc-Networks B Sacha Trifunovic FS 12 BA-2012-08
The Edit History of the National Vulnerability Database - and similar Vulnerability Databases Internet Measurement M Stephan Neuhaus FS 12 MA-2012-06
Production Traffic as a Service, Debugging OpenFlow Networks Internet Measurement M Xenofontas Dimitropoulos,
Vasileios Kotronis
FS 12 MA-2012-07
Who turned off the Internet? [confidential] Internet Measurement M Dominik Schatzmann FS 12 MA-2012-11
Flow-Based Online-Time Anomaly Detection for Large Networks [confidential] Network Security S Dominik Schatzmann FS 12 SA-2012-05
Predicting the Impact of Denial of Service Attacks Network Security M Vincent Lenders,
David Gugelmann
FS 12 MA-2012-03
WLAN-OPP Privacy Network Security S Bernhard Distl,
Franck Legendre
FS 12 ,
SA-2012-01
UAVs in Rescue Mission Networks Networked robotics S Mahdi Asadpour,
Karin Anna Hummel
FS 12 SA-2012-03
An In-Memory RDMA-Based Architecture for the Hadoop Distributed Filesystem Systems Optimization M Xenofontas Dimitropoulos FS 12 MA-2012-04
Employing Opportunistic Communication to Relieve Cellular Data Traffic: Analysis and Evaluation [confidential] Systems Optimization M Domenico Giustiniano,
Franck Legendre
FS 12 MA-2012-13
Ultra-fast and Accurate Wireless Link Quality Estimation and the Bene Wireless Mesh Networks M Vincent Lenders,
Franck Legendre
FS 12 MA-2012-02
Traffic Measurement on OpenFlow-enabled Switches S Jose F. Mingorance-Puga,
Wolfgang Mühlbauer
HS 11 SA-2011-21
Development of a Location Based Game for Android Phones S Sacha Trifunovic,
Bernhard Distl
HS 11 ,
SA-2011-29
Prototype of a Mobile Avalanche Rescue Beacon [confidential] Ad-hoc-Networks S Bernhard Distl,
Franck Legendre
HS 11 SA-2011-32
Specification and Implementation of the Twimight Server Ad-hoc-Networks S Theus Hossmann,
Dominik Schatzmann
HS 11 SA-2011-31
A Dynamic Hardware Architecture for Future Networks Embedded Systems M Ariane Trammell,
Stephan Neuhaus
HS 11 MA-2011-27
Network Protocols for Embedded Devices Embedded Systems M Ariane Trammell,
Stephan Neuhaus
HS 11 MA-2011-28
Automatic Rating of VPN Links External Projects M Martin Burkhart,
David Gugelmann
HS 11 MA-2011-17
Fuzzy Attacks on Web Logs Network Security G David Gugelmann,
Stephan Neuhaus
HS 11 GA-2011-05
SEPIA Mobile: Teaching Privacy to Android Apps Network Security S Martin Burkhart,
Dilip Many
HS 11 SA-2011-22
WLAN-OPP: WLAN-based Opportunistic Networking Implementation on Android Peer-to-Peer Networks S Bernhard Distl,
Sacha Trifunovic
HS 11 SA-2011-35
User Behavior Profiling using Smartphones M Sacha Trifunovic FS 11 MA-2011-06
Extensions to FACT (Flow-Based Approach for Connectivity Tracking) [confidential] S Dominik Schatzmann,
Wolfgang Mühlbauer
FS 11 ,
SA-2011-14
Social Data Mining on Smartphones S Sacha Trifunovic FS 11 SA-2011-09
Virtual Wishlist G Sacha Trifunovic FS 11 ,
,
GA-2011-02
Implementation of a Disaster Mode to Maintain Twitter Communications in Times of Network Outages Ad-hoc-Networks M Theus Hossmann,
Franck Legendre
FS 11 MA-2011-02
Inferring Shared Interests from Tweets Ad-hoc-Networks S Theus Hossmann,
Franck Legendre
FS 11 SA-2011-20
Lightweight Autonomic Network Architecture Embedded Systems M Ariane Trammell,
Wolfgang Mühlbauer
FS 11 MA-2011-01
Platform-Independent Software Development for Real-Time Embedded Systems [confidential] Embedded Systems M Ehud Ben-Porat FS 11 MA-2011-26
Extending HAPviewer: Time Window, Flow Classification, and Geolocation Network Security M Eduard Glatz,
Xenofontas Dimitropoulos
FS 11 MA-2011-12
Practical Private Set Operations using Probabilistic Data Structures [confidential] Network Security M Martin Burkhart,
Dilip Many
FS 11 MA-2011-07
Security Assessment of Infection Incidents in the ETH University Campus Network Security M Elias Raftopoulos,
Xenofontas Dimitropoulos
FS 11 MA-2011-03
Security Monitoring at Enterprise Level [confidential] Network Security M David Gugelmann FS 11 MA-2011-05
Network Coding for Opportunistic Content Delivery Networks (o-CDN) [confidential] Peer-to-Peer Networks S Gabriel Popa,
Kavé Salamatian
FS 11 SA-2011-18
Performance Evaluation of OpenFlow Switches Performance Evaluation S Jose F. Mingorance-Puga,
Wolfgang Mühlbauer
FS 11 SA-2011-07
Historische Entwicklung der Sicherheit in Wireless Netzwerken Wireless Security G David Gugelmann,
Dominik Schatzmann
FS 11 ,
GA-2011-04
Experimental Performance Evaluation of Routing In Delay Tolerant Networks Ad-hoc-Networks M Theus Hossmann,
Franck Legendre
HS 10 MA-2010-16
Identification of Connectivity Issues in Large Networks using Data Plane Internet Measurement S Dominik Schatzmann,
Wolfgang Mühlbauer
HS 10 SA-2010-21
Wirefox – A Measurement Plug-In for Firefox Internet Measurement S Dominik Schatzmann,
Wolfgang Mühlbauer
HS 10 SA-2010-20
Evaluating and Improving the Detection of Internet Background Radiation Network Security S Eduard Glatz,
Xenofontas Dimitropoulos
HS 10 SA-2010-23
SMS-based Certificate Authority Network Security S Sacha Trifunovic HS 10 SA-2010-25
Custom Media Player with Integrated Feedback Peer-to-Peer Networks S Sacha Trifunovic HS 10 SA-2010-24
Information Dissemination in Vehicular Networks Wireless Mesh Networks M Franck Legendre,
Thrasyvoulos Spyropoulos
HS 10 MA-2010-11
Wireless Link Quality Estimation in Mobile Networks Wireless Mesh Networks M Vincent Lenders,
Franck Legendre
HS 10 MA-2010-17
Studying Social-driven Mobility - Comparing Face-to-Face Meetings to Online Social Network Activity M Thrasyvoulos Spyropoulos,
Franck Legendre
FS 10 MA-2010-06
Distributed Challenge Analysis and Remediation in Wireless Mesh Networks M Merkourios Karaliopoulos FS 10 MA-2010-10
Multi-Sensor Monitoring for Host Security Characterization [confidential] End-point Security M Elias Raftopoulos,
Bernhard Tellenbach
FS 10 MA-2010-04
SEBPS v1.0: Designing a Secure and Maintainable End-User Platform End-point Security S Lukas Ruf FS 10 SA-2010-09
Improving the privacy of ZigBee / IEEE 802.15.4 with Dynamic and Secret Spreading Sequences [confidential] Wireless Security M Franck Legendre FS 10 MA-2010-01
Vulnerability Evaluation of Proportional Fairness Scheduling to Retransmissions Attacks Wireless Security S Ehud Ben-Porat FS 10 SA-2010-02
Implementation and Evaluation of a CNA-Based DTN Routing Protocol S Theus Hossmann,
Franck Legendre
HS 09 SA-2009-30
Sports Reporter Application for future Mobile Networks M Ariane Trammell,
Franck Legendre
HS 09 MA-2009-16
Path Length vs Distance in Mobile Wireless Networks Ad-hoc-Networks S Simon Heimlicher,
Merkourios Karaliopoulos
HS 09 SA-2009-33
Privacy in Online Social Networks External Projects M Martin Burkhart HS 09 MA-2009-11
A Software-Based Trusted Platform Module Network Security M Mario Strasser HS 09 MA-2009-10
Virtual Network Topology for Data Centers [confidential] Network Security S Bernhard Plattner HS 09 SA-2009-34
Resilience of wireless mesh networks to node misbehaviors Wireless Mesh Networks S Merkourios Karaliopoulos,
Gabriel Popa
HS 09 SA-2009-36
Jamming Detection and Performance of Rate Switching under Jamming Wireless Security M Mario Strasser,
Franck Legendre
HS 09 ,
MA-2009-15
A Security Forensics Framework Wireless Security S Mario Strasser HS 09 SA-2009-32
Aufbau eines OpenFlow Netzwerkes (report) G Bernhard Plattner,
Ariane Trammell
FS 09 ,
GA-2009-05
Erstellen einer Dokumentation für das PPS Voice over IP (report) G Bernhard Distl FS 09 ,
,
,
GA-2009-01
Zurinet - Using Public Transportation as a DTN Backbone Ad-hoc-Networks M Thrasyvoulos Spyropoulos,
Franck Legendre
FS 09 MA-2009-06
Ground truth analysis of anomalies in traffic feature distributions Network Security G Bernhard Tellenbach FS 09 GA-2009-04
Evaluating and Improving TES II [confidential] Network Security S Bernhard Tellenbach FS 09 SA-2009-17
Event Correlation Engine Network Security M Bernhard Tellenbach FS 09 MA-2009-01
Privacy-Preserving Collaboration in Network Security Network Security M Martin Burkhart,
Mario Strasser
FS 09 MA-2009-02
SIAN Software zur Identifikation von Applikationsklassen in NetFlow Network Security G Eduard Glatz,
Bernhard Tellenbach
FS 09 ,
GA-2009-03
Development of software tools to facilitate management and experimentation with the TIK wireless testbed Wireless Mesh Networks S Merkourios Karaliopoulos FS 09 SA-2009-12
Design and Implementation of SAFT on ANA II S Ariane Trammell,
Simon Heimlicher
HS 08 SA-2008-21
Interconnection of Different Network Architectures S Ariane Trammell,
Martin May
HS 08 SA-2008-22
Performance Enhancement of an Intersection Assistance System by Integrating WLAN Ad-Hoc Network with Multi-Hop Capabilities M Thrasyvoulos Spyropoulos HS 08 MA-2008-20
Autonomic Identifier Allocation for ANA (AIA) S Ariane Trammell,
Martin May
HS 08 SA-2008-23
Broadcast Synchonization in Wireless Ad Hoc Podcasting Ad-hoc-Netze S Franck Legendre HS 08 SA-2008-17
Lightweight Information System Technology LIST Ad-hoc-Netze S Bernhard Distl,
Franck Legendre
HS 08 ,
SA-2008-19
Secure Content Dissemination in Opportunistic Networks Ad-hoc-Netze M Bernhard Distl,
Franck Legendre
HS 08 ,
MA-2008-27
Opportunistic Networks with ANA Ad-hoc-Netze M Theus Hossmann,
Franck Legendre
HS 08 MA-2008-23
Secondary network activity and traffic of SMTP sender hosts [confidential] Network Security M Dominik Schatzmann,
Martin Burkhart
HS 08 MA-2008-24
Evaluating and Improving TES [confidential] Network Security M Bernhard Tellenbach,
Dominik Schatzmann
HS 08 MA-2008-28
Extending Flame: Anomaly Characterization and Extraction [confidential] Network Security M Daniela Brauckhoff,
Arno Wagner
HS 08 MA-2008-25
Invasion of Privacy Using Fingerprinting Attacks Network Security M Martin Burkhart,
Dominik Schatzmann
HS 08 MA-2008-22
A mobile payment system using an NFC mobile phone [confidential] Wireless Security M Bernhard Plattner HS 08 MA-2008-17
Jamming Detection inWireless Ad Hoc Networks Wireless Security M Vincent Lenders,
Franck Legendre
HS 08 MA-2008-21
Botnet Detection based on NetFlow Traces [confidential] M Dominik Schatzmann FS 08 MA-2008-14
Design and Implementation of SAFT on ANA S Ariane Trammell,
Simon Heimlicher
FS 08 SA-2008-12
Wireless Ad Hoc Podcasting on Symbian Ad-hoc-Netze D Vincent Lenders,
Bernhard Distl
FS 08 DA-2008-03
Mobility Modeling of Swarm Robots Ad-hoc-Netze S Merkourios Karaliopoulos FS 08 SA-2008-07
Hop-by-hop Transport on Linux [confidential] Ad-hoc-Netze M Simon Heimlicher,
Ariane Trammell
FS 08 MA-2008-10
SimBet Ad-hoc-Netze S Thrasyvoulos Spyropoulos FS 08 SA-2008-15
Redundancy for Compact Turbine Controller External Projects D Rainer Baumann FS 08 DA-2008-01
Lightweight Detection of Malicious Traffic in Wireless Mesh Networks External Projects M Mario Strasser FS 08 MA-2008-15
Analysis and Modeling of Internet Epidemics Network Security M Daniela Brauckhoff,
Bernhard Tellenbach
FS 08 MA-2008-01
Towards Revealing Attackers Intent by Automatically Decrypting Network Traffic Network Security M Bernhard Tellenbach FS 08 MA-2008-08
Characterizing network activity of mail servers [confidential] Network Security S Dominik Schatzmann,
Bernhard Tellenbach
FS 08 SA-2008-11
Implementation of an Anomaly Injection Framework Network Security D Daniela Brauckhoff,
Martin Burkhart
FS 08 DA-2008-04
Next Generation / Secure E-Banking [confidential] Network Security M Rainer Baumann FS 08 MA-2008-04
Rating Autonomous Systems [confidential] Network Security M Bernhard Tellenbach,
Dominik Schatzmann
FS 08 MA-2008-07
Sharing of Traffic Measurements with Privacy Based on Multi-Party Computation [confidential] Network Security M Martin Burkhart,
Mario Strasser
FS 08 MA-2008-02
Signature-based Extrusion Detection Network Security M Bernhard Tellenbach FS 08 MA-2008-06
Using Air Traffic as a Delay-Tolerant Networking Backbone Peer-to-Peer Networks S Franck Legendre,
Martin May
FS 08 SA-2008-01
Security of Field-based Routing Wireless Security S Mario Strasser FS 08 SA-2008-08
Development of a mobile MMOG Ad-hoc-Netze S Martin May HS 07 ,
SA-2007-66
Game-Based Learning and its Application in Business Environments External Projects M Bernhard Plattner,
Rainer Baumann
HS 07 MA-2007-34
Dissecting Port 80 Traffic [confidential] Network Security M Bernhard Tellenbach,
Dominik Schatzmann
HS 07 MA-2007-43
Localization of Known Anomaly Types in NetFlow Traces Network Security S Daniela Brauckhoff,
Arno Wagner
HS 07 SA-2007-54
Theft and Misuse Protection for Anonymous Credentials Network Security M Bernhard Tellenbach HS 07 MA-2007-42
New Protocols and Applications for the Future Internet Reconfigurable Computing M Theus Hossmann,
Martin May
HS 07 MA-2007-39
Secure Node Monitoring in WSNs [confidential] Wireless Security M Mario Strasser HS 07 MA-2007-35
Call Route Discovery with Asterisk / DUNDi S Ulrich Fiedler SS 07 André Wangler SA-2007-58
The ANA Project - Development of the ANA-Core Software M Theus Hossmann SS 07 MA-2007-38
Experimentation and evaluation of routing metrics for multi-hop ad-hoc wireless networks on an indoor wireless testbed Ad-hoc-Netze S Georgios Parissidis SS 07 SA-2007-39
Topology Estimation in Mobile Ad Hoc Networks Ad-hoc-Netze M Theus Hossmann SS 07 MA-2007-37
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks Ad-hoc-Netze M Rainer Baumann SS 07 MA-2007-13
Analyzing network traffic from the SWITCH network from 2003 until today Network Security M Bernhard Tellenbach SS 07 MA-2007-12
Anomaly Analysis using Host-behavior Clustering Network Security M Daniela Brauckhoff SS 07 MA-2007-31
Application Detection and Modelling using Network Traces Network Security M Bernhard Tellenbach SS 07 MA-2007-14
Towards Automated Exploit Signature Generation using Honeypots Network Security M Bernhard Tellenbach SS 07 MA-2007-09
IEEE 802.11 Wireless Security Network Security S Martin May,
Bernhard Tellenbach
SS 07 SA-2007-43
Online-Games: Traffic Analysis of Popular Game Servers (Counter Strike: Source) Peer-to-Peer Networks S Martin May SS 07 SA-2007-42
Portierung von Topsy v3 auf den Intel Pentium 4 Voice over IP S Daniela Brauckhoff SS 07 SA-2007-19
Industrial Networks - Connecting Controllers via OPC M Rainer Baumann WS 07 MA-2007-06
Implementation of HEAT for Linux 2.6 with IPv6 Ad-hoc-Netze S Rainer Baumann WS 07 SA-2007-16
Implementation of a Field Based Routing Protocol for Wireless Mesh Networks Ad-hoc-Netze S Rainer Baumann WS 07 ,
SA-2007-03
A Framework For Transport Protocol Implementation And Evaluation On Linux 2.6 [confidential] Ad-hoc-Netze S Simon Heimlicher WS 07 SA-2007-09
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks Ad-hoc-Netze M Rainer Baumann WS 07 MA-2007-00
Wireless Ad Hoc Podcasting with Handhelds Ad-hoc-Netze M Vincent Lenders WS 07 MA-2007-05
Porting TOPSY v3 to the IXP2400 Eingebettete Systeme S Lukas Ruf WS 07 ,
SA-2007-18
Representation of XML Schema Components External Projects D Erik Wilde WS 07 DA-2007-01
Harpoon: A Flow-level Traffic Generator Network Security S Daniela Brauckhoff WS 07 SA-2007-06
Anomaly Visibility and Detectability in Sampled Traffic Network Security S Daniela Brauckhoff WS 07 SA-2007-12
Towards Exploit Signature Generation using Honeypots II Network Security S Bernhard Tellenbach WS 07 SA-2007-13
Force-based Visualization of Peer-to-peer Nodes Peer-to-Peer Networks S Marcel Baur WS 07 SA-2007-01
Erweiterung von PolyPhone um eine Infrastruktur für SIP Instant Messaging-Dienste PolyPhone S Marcel Baur WS 07 SA-2007-02
Distributed Terminal Location Discovery in a TOWN Network Voice over IP N Rainer Baumann WS 07 NA-2007-01
3D Visualisierung von Field Based Routing (FBR) Ad-hoc-Netze S Rainer Baumann SS 06 SA-2006-14
Channel Allocation for IEEE 802.16 Mesh Networks Ad-hoc-Netze M Rainer Baumann SS 06 MA-2006-24
DSNAnalyzer: Backend for the Deployment Support Network Ad-hoc-Netze M Martin May SS 06 MA-2006-18
Evaluation of scheduling methods over multipath routing in wireless mobile Ad Hoc networks Ad-hoc-Netze S Georgios Parissidis SS 06 ,
SA-2006-26
Scalable Real-time Multiplayer Game Network Support for Orxonox Ad-hoc-Netze S Károly Farkas SS 06 ,
SA-2006-31
Trace Control for Netem Ad-hoc-Netze S Rainer Baumann SS 06 SA-2006-15
Routing Algorithms for Safety Critical Wireless Sensor Networks Ad-hoc-Netze M Martin May SS 06 MA-2006-25
The Impact of the Choice of Metrics for Routing - wicht a focus on Wireless Mesh Networking (WMN) Ad-hoc-Netze M Rainer Baumann,
Simon Heimlicher
SS 06 MA-2006-13
Design and Implementation of an Emulator for the Intel IXP 2400 Network Processor Eingebettete Systeme S Lukas Ruf SS 06 SA-2006-17
Simulative Leistungsbewertung und Entwicklung rekonfigurationsfester Routingverfahren für mehrstufige Verbindungsnetzwerke Eingebettete Systeme M Lukas Ruf SS 06 Christian Zimmermann MA-2006-16
XPath-Unterstützung in einer Linux Shell ETH World Program S Erik Wilde SS 06 SA-2006-11
Automated Monitoring of Internet Service Provider (ISP) Topologies External Projects M Daniela Brauckhoff SS 06 MA-2006-11
An Implementation of a Byte Frequency Signature Generator Using a Gibbs Sampler Network Security S Bernhard Tellenbach SS 06 SA-2006-21
Entropy Plug-in and Visualisation Tool Network Security S Arno Wagner SS 06 SA-2006-25
Design and Implementation of a Protocol-Aware Connection Tracker Framework Network Security S Bernhard Tellenbach SS 06 ,
SA-2006-20
Access Control in a Peer-to-Peer Storage Systems Peer-to-Peer Networks M Marcel Baur SS 06 MA-2006-10
Firewall and NAT Traversal for Peer-to-Peer Storage Nodes Peer-to-Peer Networks S Marcel Baur SS 06 SA-2006-23
Implementation of the Kademlia Distributed Hash Table Peer-to-Peer Networks S Marcel Baur SS 06 SA-2006-19
Proxies in PromethOS Service Provisioning S Lukas Ruf SS 06 SA-2006-16
A Simple Overlay Platform for Distributed Monitoring D Bernhard Plattner WS 06 DA-2006-06
Worm Outbreak Detection in the Internet Backbone D Arno Wagner WS 06 DA-2006-03
Proaktive Verhinderung von Attacken auf Applikationen M Bernhard Plattner WS 06 ,
MA-2006-12
Real-time Monitoring and Control for large Server Clusters D Bernhard Plattner WS 06 DA-2006-07
Ad Hoc Communication with Handhelds Ad-hoc-Netze S Vincent Lenders WS 06 ,
SA-2006-02
BlueLocation II - A Localization Infrastructure for Blutooth Enabled Mobile Devices Ad-hoc-Netze S Vincent Lenders WS 06 ,
SA-2006-03
Implementation of SAFT [confidential] Ad-hoc-Netze S Simon Heimlicher,
Rainer Baumann
WS 06 ,
SA-2006-08
Mobility Prediction in MANETs Ad-hoc-Netze M Károly Farkas WS 06 MA-2006-08
Multiplayer Gaming in Mobile Adhoc Networks Ad-hoc-Netze S Károly Farkas WS 06 ,
SA-2006-04
Routing in Ad Hoc Networks with mobile Users Ad-hoc-Netze M Vincent Lenders WS 06 MA-2006-02
Management of Distributed Services in MANETs Ad-hoc-Netze M Károly Farkas WS 06 Eduardo Silva MA-2006-07
Student Webportal for Courses ETH World Program S Rainer Baumann WS 06 SA-2006-05
Web Based Services (WBS) ETH World Program S Keno Albrecht WS 06 SA-2006-09
Passive Measurement of Network Quality (External) External Projects M Arno Wagner WS 06 MA-2006-03
Evaluating Circuit Emulation Adapters External Projects S Rainer Baumann WS 06 SA-2006-10
Implementing a circuit emulation adapter S Ulrich Fiedler SS 05 SA-2005-34
Analysis of Dynamics in Mobile Ad-Hoc Networks Ad-hoc-Netze S Vincent Lenders SS 05 ,
SA-2005-18
BlueLocation Ad-hoc-Netze S Vincent Lenders SS 05 SA-2005-17
BlueFramework - Application Framework for Bluetooth Enabled Mobile Phones Ad-hoc-Netze M Matthias Bossardt SS 05 MA-2005-16
Routing Protocol for a Wireless Fire Detection Network Ad-hoc-Netze S Martin May SS 05 SA-2005-35
Quality of Service for Multiplayer Game Provisioning in Mobile Ad Hoc Networks Ad-hoc-Netze M Károly Farkas SS 05 MA-2005-18
Setting up an Ad Hoc Testbed Network Ad-hoc-Netze S Károly Farkas SS 05 SA-2005-32
Real-time Audio Data Transmission over MANETs^1 Ad-hoc-Netze S Rainer Baumann SS 05 SA-2005-36
Integration von PolyPhone in myETH ETH World Program S Bernhard Plattner SS 05 SA-2005-37
ShaRefWeb A Web Interface for the ShaRef Service ETH World Program M Erik Wilde SS 05 MA-2005-15
WebCam-Plattform für die ETH Zürich ETH World Program S Bernhard Plattner SS 05 ,
SA-2005-29
Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs Network Security D Thomas Dübendorfer SS 05 DA-2005-06
Automated Attack Signature Generation: A Survey Network Security S Daniela Brauckhoff SS 05 SA-2005-38
Implementation of a Distributed Traffic Control Service using FPGAs Network Security D Matthias Bossardt SS 05 DA-2005-07
Kostenanalyse von präventiven IT-Sicherheitsmassnahmen Network Security S Thomas Dübendorfer SS 05 SA-2005-25
Web Attack Showcases for the Security Demo Lab Network Security S Stefan Frei SS 05 SA-2005-24
Service Management Procedures Supporting Distributed Services in Mobile Ad Hoc Networks Service Provisioning M Károly Farkas SS 05 MA-2005-14
Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? N Ulrich Fiedler WS 05 NA-2005-02
Trace-Based Network Emulation M Ulrich Fiedler WS 05 MA-2005-06
Vom Fahrgastinformations- zum Infotainmentsystem M Ulrich Fiedler WS 05 MA-2005-20
BlueDating - Dating Application for Bluetooth Enabled Mobile Phones Ad-hoc-Netze S Vincent Lenders WS 05 ,
SA-2005-08
Bluetella - File Sharing for Bluetooth Enabled Mobile Phones Ad-hoc-Netze S Matthias Bossardt WS 05 ,
SA-2005-03
SAFT Store And Forward Transport - Reliable Transport in Wireless Mobile Ad-hoc Networks Ad-hoc-Netze M Martin May WS 05 MA-2005-08
Service Discovery and Routing in Mobile Ad-Hoc Networks Ad-hoc-Netze M Martin May WS 05 MA-2005-03
Energy Conserving Camera Scheduling Policies for Sensor Networks Ad-hoc-Netze M Matthias Bossardt WS 05 MA-2005-11
Management of Distributed Traffic Control Service Network Security M Matthias Bossardt WS 05 MA-2005-02
Near Real-Time Detection of Traffic Usage Rhythm Anomalies in the Backbone Network Security D Thomas Dübendorfer WS 05 DA-2005-03
Scan Detection Based Identification of Worm-Infected Hosts Network Security M Arno Wagner WS 05 ,
MA-2005-01
P2P Filesharing Traffic Identification Method Validation and Verification Peer-to-Peer Networks S Arno Wagner WS 05 SA-2005-11
A Framework for Programming Packet Processors D Lukas Ruf SS 04 DA-2004-01
Communication and Management Infrastructure for Services on Active Router S Matthias Bossardt SS 04 ,
SA-2004-27
Mapping Services Onto Hierarchy-extended Active Network Nodes D Lukas Ruf SS 04 DA-2004-13
Parallel Image Registration in Distributed Memory Environments M Placi Flury SS 04 MA-2004-05
VSETH Informations-System S Benjamin Stäger SS 04 SA-2004-34
Analysis of Sobig.F and Blaster Worm Characteristics Network Security S Thomas Dübendorfer SS 04 SA-2004-23
Detecting Bots in Internet Relay Chat Systems Network Security S Thomas Dübendorfer SS 04 ,
SA-2004-29
Kostenmodell zu präventiven IT-Sicherheitsmassnahmen Network Security S Thomas Dübendorfer SS 04 SA-2004-28
Secure Java Code Interpreter for Public Utility Computing Network Security N Thomas Dübendorfer SS 04 NA-2004-01
Visualisation of Client/Server Behaviour Network Security S Thomas Dübendorfer SS 04 SA-2004-24
Distributed Accounting for P2P Content Services Peer-to-Peer Networks D David Hausheer SS 04 DA-2004-15
P2P Population Tracking and Traffic Characterization of Current P2P File-sharing Systems Peer-to-Peer Networks M Arno Wagner SS 04 MA-2004-04
Implementation eines Auktions-basierten Pricing Mechanismus für Peer-to-Peer Systeme Peer-to-Peer Networks S David Hausheer SS 04 SA-2004-26
Service Provisioning in Mobile Ad Hoc Networks Service Provisioning M Károly Farkas SS 04 MA-2004-09
A Lightweight Packet Capturer for High-Speed Links S Thomas Dübendorfer WS 04 SA-2004-08
Patterns for Service Deployment in Programmable Networks D Matthias Bossardt WS 04 Daniela Brauckhoff DA-2004-03
Analysis of Internet Relay Chat Usage by DDoS Zombies M Thomas Dübendorfer WS 04 MA-2004-01
Multi-objective Routing mit Ameisenalgorithmen S Placi Flury WS 04 SA-2004-02
Design and Implementation of an Emulator for the IBM PowerNP 4GS3 D Lukas Ruf WS 04 DA-2004-08
Kosten- Nutzenanalyse des Neptun Projekts S Bernhard Plattner WS 04 SA-2004-20
P2P Filesharing Systems: Real World NetFlow Traffic Characterization B Arno Wagner WS 04 BA-2004-01
Parallel distributed filesystem with metadata database D Bernhard Plattner WS 04 ,
DA-2004-11
Plug-ins for DDoS Attack Detection in Realtime S Thomas Dübendorfer WS 04 SA-2004-19
Resource Controlled Interprocessor Communication On NP-based Active Network Nodes D Lukas Ruf WS 04 DA-2004-17
Active Network Service mit Netlink S Matthias Bossardt WS 04 SA-2004-17
Towards Resilience Against Node Failures in Overlay Multicast Schemes S Kostas Katrinis WS 04 SA-2004-14
Integrity Protection for Secure Networked Storage Network Security D Marcel Waldvogel WS 04 DA-2004-16
A Distributed Monitoring System for large, heterogeneous WLANs D Vincent Lenders SS 03 DA-2003-30
Ant Based Routing System S Placi Flury SS 03 ,
SA-2003-21
Aufbau und Betrieb eines Konferenzplanungssystems für die WWW2003 S Erik Wilde SS 03 ,
SA-2003-33
Configuration of SIP-based Conference Servers S Kostas Katrinis SS 03 SA-2003-32
DDoS Attack Detection Based on Netflow Logs S Thomas Dübendorfer SS 03 SA-2003-35
Distributed Content-based Accounting and Charging in P2P D David Hausheer SS 03 DA-2003-33
Bluetella: A Java Application for New Mobile Phones S Matthias Bossardt SS 03 SA-2003-19
Lookup in Peer-to-Peer Networks S Jan Mischke SS 03 SA-2003-29
Design and implementation of a modular emulator for Topsy D Lukas Ruf SS 03 DA-2003-25
Realtime UDP NetFlow Processing Framework D Thomas Dübendorfer SS 03 DA-2003-26
Reputation and Trust Management in Ad Hoc Networks with Misbehaving Nodes D Vincent Lenders SS 03 DA-2003-27
Search in Peer-to-Peer Networks S Jan Mischke SS 03 SA-2003-34
Simulation-Based Analysis of Internet Worm Characteristics S Thomas Dübendorfer SS 03 SA-2003-26
Strukturierung, Navigation und Suche in semantischen Netzen S Placi Flury SS 03 SA-2003-24
Wirtschaftliche Auswirkungen von DDoS Attacken auf Backbone-Provider S Thomas Dübendorfer SS 03 ,
SA-2003-27
Pattern-based service deployment in active networks S Matthias Bossardt WS 03 ,
SA-2003-13
Analyzing MorphMix - a Peer-to-Peer based System for Anonymous Internet Access S Marc Rennhard WS 03 SA-2003-12
Database-driven XML-anabled Bibliography Management System D Erik Wilde WS 03 ,
DA-2003-05
Comparison of Centralized (Client/Server) and Decentralized (Peer-to-peer) Networking S Jan Mischke WS 03 SA-2003-16
Design and implementation of a Presentation Tool for an Educational Delivery Platform S Georgios Parissidis WS 03 SA-2003-08
Desktop Firewalls and Intrunsion Detection D Marc Rennhard WS 03 DA-2003-22
Einsatz und Programmierung des IBM NP4GS3 Netzwerkprozessors fuer AktiveNetzwerkknoten unter Linux D Lukas Ruf WS 03 DA-2003-12
Integration of a Proof of Delivery in a WAP Content Billing Architecture for Third Party Services D Burkhard Stiller WS 03 DA-2003-18
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers S Keno Albrecht WS 03 SA-2003-04
PromethOS v2.0 - Memory Resource Control in the Linux 2.4 Kernel D Lukas Ruf WS 03 DA-2003-24
MPEG-4 FGS Codec D Kostas Katrinis WS 03 DA-2003-20
Network Troubleshooting Expert System D Marc Rennhard WS 03 DA-2003-21
Non-Repudiation of Service Consumption in MobyDick Networks D Hasan Hasan WS 03 DA-2003-01
Simulation of a Data Centric Routing Protocol for Mobile Ad Hoc Networks D Vincent Lenders WS 03 DA-2003-07
Secure E-MAIL D Nathalie Weiler WS 03 DA-2003-13
Service Composition for Active Networks D Matthias Bossardt WS 03 ,
DA-2003-06
Simulative Performance Optimization for TCP over UMTS D Burkhard Stiller WS 03 DA-2003-19
Trace QoS A tool for locating QoS failures on an Internet path D Placi Flury WS 03 DA-2003-16
Toolkit für Konferenzprogrammverwaltung und -personalisierung D Erik Wilde WS 03 ,
DA-2003-03
A Compact Syntax for XML Schema D Erik Wilde WS 03 DA-2003-04
top
© 2016 Laboratory TIK, ETH Zurich | Imprint | Last updated on Mon, 18 May, 2015 18:15 | t=0.1263s | Valid HTML 4.01