Past Theses for Communication Systems
|
|
title |
category |
type |
contact/supervisor |
assigned |
student(s) |
thesis number |
|
|
Internet-Technologien für die Erhaltung und Verbesserung der Lebensqualität und der Selbständigkeit von älteren Menschen [confidential] |
|
S |
Bernhard Plattner |
HS 15 |
|
SA-2015-72 |
|
Context-awareness of Opportunistic radio contacts [confidential] |
External Projects |
S |
Laurent Vanbever,
Bernhard Plattner |
HS 15 |
|
SA-2015-29 |
|
Security and Privacy in Opportunistic Networks [confidential] |
|
M |
Bernhard Plattner |
FS 15 |
|
MA-2015-40 |
|
Measuring Explicit Congestion Negotiation (ECN) support based on P2P
networks |
Internet Measurement |
S |
Brian Trammell,
Mirja Kühlewind |
FS 15 |
|
SA-2015-05 |
|
A Mission-Aware Routing Algorithm for Micro Aerial Vehicle Networks |
Networked robotics |
S |
Mahdi Asadpour,
Karin Anna Hummel |
FS 15 |
,
|
SA-2015-03 |
|
Performance Evaluation and Optimization of p2pkit-based Opportunistic Networking [confidential] |
Peer-to-Peer Networks |
M |
Franck Legendre,
Bernhard Plattner |
FS 15 |
|
MA-2015-36 |
|
An Adaptive Hardware/Software Interface for EmbedNet |
Reconfigurable Computing |
S |
Markus Happe |
FS 15 |
|
SA-2015-09 |
|
Generic Functional Blocks for FPGA-based Network Nodes |
Reconfigurable Computing |
S |
Markus Happe |
FS 15 |
|
SA-2015-08 |
|
Self-Learning Enterprise Networks Via Software Defined Networking [confidential] |
Software Defined Networking |
M |
Panagiotis Georgopoulos,
Laurent Vanbever |
FS 15 |
|
MA-2015-25 |
|
CONTACT: Information Sharing Between Strangers With Hyperlocal Community Wireless Networks [confidential] |
Ad-hoc-Networks |
S |
Panayotis Antoniadis |
HS 14 |
|
SA-2014-44 |
|
Analyzing the Time Dynamics in IXP Datasets |
Internet Measurement |
S |
,
Vasileios Kotronis |
HS 14 |
|
SA-2014-43 |
|
Early Detection of Real-World Events with Twitter |
Internet Measurement |
M |
Vincent Lenders,
David Gugelmann |
HS 14 |
|
MA-2014-18 |
|
Quantifying Web Personalization |
Internet Measurement |
S |
David Gugelmann |
HS 14 |
|
SA-2014-37 |
|
WiFi Based Time-of-Flight Indoor Localization [confidential] |
Localization |
M |
Domenico Giustiniano,
Vincent Lenders |
HS 14 |
|
MA-2014-15 |
|
Smartphone App for Fused Indoor Localization |
Localization |
M |
Vincent Lenders,
Domenico Giustiniano |
HS 14 |
|
MA-2014-20 |
|
Reconstructing HTTPS Activity from Traffic Metadata [confidential] |
Network Security |
S |
David Gugelmann |
HS 14 |
|
SA-2014-38 |
|
Flow Embedding Algorithms for Software Defined Audio Networks |
Software Defined Networking |
M |
Panagiotis Georgopoulos,
Vasileios Kotronis |
HS 14 |
|
MA-2014-14 |
|
SDN-assisted IP Multicast |
Software Defined Networking |
S |
Panagiotis Georgopoulos |
HS 14 |
|
SA-2014-30 |
|
SDN-based Source Address Dilution Service [confidential] |
Software Defined Networking |
M |
Vincent Lenders |
HS 14 |
|
MA-2014-12 |
|
Theoretical and Empirical Evaluation of UepaaNet`s Scalability [confidential] |
Wireless Mesh Networks |
S |
Bernhard Distl |
HS 14 |
|
SA-2014-27 |
|
Jamming Mitigation in Bandwidth Hopping Spread Spectrum Communications [confidential] |
Wireless Security |
M |
Vincent Lenders,
Domenico Giustiniano |
HS 14 |
|
MA-2014-21 |
|
Collaborative Spectrum Monitoring [confidential] |
|
M |
Vincent Lenders,
Domenico Giustiniano |
FS 14 |
|
MA-2014-07 |
|
Avalanche Rescue Beacon with Smartphones [confidential] |
Ad-hoc-Networks |
M |
Franck Legendre,
Bernhard Distl |
FS 14 |
|
MA-2014-05 |
|
Bringing Network Access to Disconnected Regions using DTN Throwboxes |
Ad-hoc-Networks |
M |
Abdullah Alhussainy,
Karin Anna Hummel |
FS 14 |
|
MA-2014-04 |
|
OppNet: An Energy Optimized Service Platform for Opportunistic Networking on
Android |
Ad-hoc-Networks |
M |
Sacha Trifunovic |
FS 14 |
|
MA-2014-01 |
|
Path Transparency for Explicit Congestion Notification |
Internet Measurement |
M |
Brian Trammell,
Stephan Neuhaus |
FS 14 |
|
MA-2014-10 |
|
Help! My Birthday Reminder Wants to Brick My Phone |
Network Security |
M |
Stephan Neuhaus,
Brian Trammell |
FS 14 |
|
MA-2014-09 |
|
Visualization of HTTP Network Traffic for Digital Forensics [confidential] |
Network Security |
S |
David Gugelmann,
Vincent Lenders |
FS 14 |
|
SA-2014-12 |
|
Designing a Routing Algorithm for UAV Swarms based on Simulation and Measurements [confidential] |
Networked robotics |
S |
Mahdi Asadpour,
Karin Anna Hummel |
FS 14 |
|
SA-2014-23 |
|
Specification, Implementation and Load Test of UepaaNet Cloud Services [confidential] |
Peer-to-Peer Networks |
S |
Franck Legendre,
Bernhard Distl |
FS 14 |
|
SA-2014-19 |
|
TCP Congestion Control on RTP Media Streams |
Performance Evaluation |
S |
Brian Trammell |
FS 14 |
|
SA-2014-15 |
|
Resource-efficient Dynamic Partial Reconfiguration on FPGAs |
Reconfigurable Computing |
S |
Markus Happe,
Ariane Trammell |
FS 14 |
|
SA-2014-17 |
|
Detection of GNSS Multipath Errors in Urban Environments [confidential] |
|
M |
Domenico Giustiniano |
HS 13 |
|
MA-2013-21 |
|
Telemetry Unit for a Formula Student Race Car |
|
S |
Mahdi Asadpour |
HS 13 |
|
SA-2013-67 |
|
Location-Aware Currency for a Social Shopping Game [confidential] |
External Projects |
S |
Sacha Trifunovic |
HS 13 |
|
SA-2013-69 |
|
XMPProbe - XMPP Server Monitoring |
Internet Measurement |
S |
Brian Trammell,
Xenofontas Dimitropoulos |
HS 13 |
|
SA-2013-66 |
|
Finding rogue WLAN Access Points [confidential] |
Localization |
M |
Vincent Lenders,
Domenico Giustiniano |
HS 13 |
|
MA-2013-10 |
|
Time-of-Flight WLAN Indoor Tracking System |
Localization |
M |
Vincent Lenders,
Domenico Giustiniano |
HS 13 |
|
MA-2013-13 |
|
Cross-Domain DoS Link-Flooding Attack Detection and Mitigation using SDN
Principles |
Network Security |
M |
Vasileios Kotronis,
Xenofontas Dimitropoulos |
HS 13 |
|
MA-2013-18 |
|
Evaluating the Effect of SDN Centralization on Internet Routing Convergence |
Software Defined Networking |
M |
Vasileios Kotronis,
Xenofontas Dimitropoulos |
HS 13 |
|
MA-2013-19 |
|
Policy-based Injection of Private Traffic into a Public SDN Testbed |
Software Defined Networking |
M |
,
Vasileios Kotronis |
HS 13 |
|
MA-2013-12 |
|
UepaaNet Testbed, Performance Evaluation and Optimization [confidential] |
Wireless Mesh Networks |
M |
Franck Legendre,
Bernhard Distl |
HS 13 |
|
MA-2013-07 |
|
Bandwidth Hopping Spread Spectrum [confidential] |
Wireless Security |
M |
Vincent Lenders,
Domenico Giustiniano |
HS 13 |
|
MA-2013-20 |
|
Design and Implementation of a GameCenter for Opportunistic Networks |
|
G |
Sacha Trifunovic |
FS 13 |
,
,
|
GA-2013-05 |
|
Messaging Challenges in a Globally Distributed Network |
|
M |
David Gugelmann |
FS 13 |
|
MA-2013-02 |
|
WLAN-Opp-based Game: Infectious |
|
G |
Sacha Trifunovic |
FS 13 |
,
|
GA-2013-06 |
|
Intrusion Prevention for Flexible Protocol Stacks |
Embedded Systems |
M |
Ariane Trammell,
Markus Happe |
FS 13 |
|
MA-2013-04 |
|
Investigating the Accuracy of SIFS Time for Time-Of-Flight WLAN Localization [confidential] |
Embedded Systems |
S |
Domenico Giustiniano |
FS 13 |
|
SA-2013-03 |
|
Power-line Communication Performance for Peer-To-Peer Mesh Networks in Urban
Neighbourhoods |
Embedded Systems |
S |
Domenico Giustiniano |
FS 13 |
|
SA-2013-42 |
|
Screen Watermarking for Data Leakage Investigations [confidential] |
End-point Security |
M |
David Gugelmann |
FS 13 |
|
MA-2013-06 |
|
Visualizing Dynamics in Frequent Itemset Mining Timeseries |
Internet Measurement |
S |
,
Eduard Glatz |
FS 13 |
|
SA-2013-43 |
|
Analysis of Data Leakage over HTTP [confidential] |
Network Security |
M |
David Gugelmann |
FS 13 |
|
MA-2013-03 |
|
Supporting Header Field Re-writing for Policy-bound Flows in a Software Defined
Network |
Software Defined Networking |
S |
|
FS 13 |
|
SA-2013-44 |
|
Jamming-resistant Wireless Communication [confidential] |
Wireless Security |
M |
Vincent Lenders,
Domenico Giustiniano |
FS 13 |
|
MA-2013-01 |
|
OppMap: Opportunistic Map and Location Sharing |
|
S |
Sacha Trifunovic |
HS 12 |
,
|
SA-2012-24 |
|
WiFi-based Overflight Localization of Victims [confidential] |
|
M |
Franck Legendre |
HS 12 |
|
MA-2012-16 |
|
WLAN-Opp-based Turn-based Strategy Game |
|
S |
Sacha Trifunovic |
HS 12 |
|
SA-2012-28 |
|
Real-World Evaluation of Ad Hoc Routing Algorithms |
Ad-hoc-Networks |
S |
Mahdi Asadpour,
Domenico Giustiniano |
HS 12 |
|
SA-2012-35 |
|
Time-of-Flight WLAN Localization [confidential] |
Ad-hoc-Networks |
S |
Domenico Giustiniano |
HS 12 |
|
SA-2012-25 |
|
Improved Offline Operation of Twimight |
Ad-hoc-Networks |
S |
Theus Hossmann,
Paolo Carta |
HS 12 |
|
SA-2012-36 |
|
WLAN based Opportunistic Networking Performance Evaluation and Optimization |
Ad-hoc-Networks |
M |
Sacha Trifunovic,
Bernhard Distl |
HS 12 |
|
MA-2012-31 |
|
Hardware Encryption for Embedded Systems |
Embedded Systems |
S |
Ariane Trammell,
Stephan Neuhaus |
HS 12 |
|
SA-2012-16 |
|
Best Practices to Securely Operate Hardware Security Modules in a High Availability
Setup |
External Projects |
S |
Stephan Neuhaus |
HS 12 |
|
SA-2012-27 |
|
Showing The Way To Alpine Safety [confidential] |
External Projects |
S |
Franck Legendre |
HS 12 |
|
SA-2012-33 |
|
OpenFlow: A Security Analysis |
Network Security |
M |
Paul Smith,
Vasileios Kotronis |
HS 12 |
|
MA-2012-20 |
|
Anomaly Detection with Virtual Service Migration in Cloud Infrastructures |
Network Security |
M |
Paul Smith,
Bernhard Plattner |
HS 12 |
|
MA-2012-17 |
|
Reducing Energy Consumption in Hybrid Wireless Communication |
Wireless Mesh Networks |
S |
Karin Anna Hummel,
Franck Legendre |
HS 12 |
|
SA-2012-22 |
|
RFID-powered vending machine |
|
G |
Sacha Trifunovic |
FS 12 |
,
Johannes Suter |
GA-2012-01 |
|
Local Browsing |
|
S |
Bernhard Plattner |
FS 12 |
,
,
|
SA-2012-37 |
|
Probabilistic Inference in Online Social Networks [confidential] |
|
M |
Vincent Lenders,
Franck Legendre |
FS 12 |
|
MA-2012-12 |
|
A Lightweight Data Dissemination Algorithm for Multi-hop Wireless Networks |
Ad-hoc-Networks |
S |
Mahdi Asadpour,
Karin Anna Hummel |
FS 12 |
|
SA-2012-09 |
|
WLAN-Opp-based RPG |
Ad-hoc-Networks |
B |
Sacha Trifunovic |
FS 12 |
|
BA-2012-08 |
|
The Edit History of the National Vulnerability Database - and similar Vulnerability
Databases |
Internet Measurement |
M |
Stephan Neuhaus |
FS 12 |
|
MA-2012-06 |
|
Production Traffic as a Service, Debugging OpenFlow Networks |
Internet Measurement |
M |
Xenofontas Dimitropoulos,
Vasileios Kotronis |
FS 12 |
|
MA-2012-07 |
|
Who turned off the Internet? [confidential] |
Internet Measurement |
M |
Dominik Schatzmann |
FS 12 |
|
MA-2012-11 |
|
Flow-Based Online-Time Anomaly Detection for Large Networks [confidential] |
Network Security |
S |
Dominik Schatzmann |
FS 12 |
|
SA-2012-05 |
|
Predicting the Impact of Denial of Service Attacks |
Network Security |
M |
Vincent Lenders,
David Gugelmann |
FS 12 |
|
MA-2012-03 |
|
WLAN-OPP Privacy |
Network Security |
S |
Bernhard Distl,
Franck Legendre |
FS 12 |
,
|
SA-2012-01 |
|
UAVs in Rescue Mission Networks |
Networked robotics |
S |
Mahdi Asadpour,
Karin Anna Hummel |
FS 12 |
|
SA-2012-03 |
|
An In-Memory RDMA-Based Architecture for the Hadoop Distributed Filesystem |
Systems Optimization |
M |
Xenofontas Dimitropoulos |
FS 12 |
|
MA-2012-04 |
|
Employing Opportunistic Communication to Relieve Cellular Data Traffic: Analysis and Evaluation [confidential] |
Systems Optimization |
M |
Domenico Giustiniano,
Franck Legendre |
FS 12 |
|
MA-2012-13 |
|
Ultra-fast and Accurate Wireless Link Quality Estimation and the Bene |
Wireless Mesh Networks |
M |
Vincent Lenders,
Franck Legendre |
FS 12 |
|
MA-2012-02 |
|
Traffic Measurement on OpenFlow-enabled Switches |
|
S |
Jose F. Mingorance-Puga,
Wolfgang Mühlbauer |
HS 11 |
|
SA-2011-21 |
|
Development of a Location Based Game for Android Phones |
|
S |
Sacha Trifunovic,
Bernhard Distl |
HS 11 |
,
|
SA-2011-29 |
|
Prototype of a Mobile Avalanche Rescue Beacon [confidential] |
Ad-hoc-Networks |
S |
Bernhard Distl,
Franck Legendre |
HS 11 |
|
SA-2011-32 |
|
Specification and Implementation of the Twimight Server |
Ad-hoc-Networks |
S |
Theus Hossmann,
Dominik Schatzmann |
HS 11 |
|
SA-2011-31 |
|
A Dynamic Hardware Architecture for Future Networks |
Embedded Systems |
M |
Ariane Trammell,
Stephan Neuhaus |
HS 11 |
|
MA-2011-27 |
|
Network Protocols for Embedded Devices |
Embedded Systems |
M |
Ariane Trammell,
Stephan Neuhaus |
HS 11 |
|
MA-2011-28 |
|
Automatic Rating of VPN Links |
External Projects |
M |
Martin Burkhart,
David Gugelmann |
HS 11 |
|
MA-2011-17 |
|
Fuzzy Attacks on Web Logs |
Network Security |
G |
David Gugelmann,
Stephan Neuhaus |
HS 11 |
|
GA-2011-05 |
|
SEPIA Mobile: Teaching Privacy to Android Apps |
Network Security |
S |
Martin Burkhart,
Dilip Many |
HS 11 |
|
SA-2011-22 |
|
WLAN-OPP: WLAN-based Opportunistic Networking Implementation on Android |
Peer-to-Peer Networks |
S |
Bernhard Distl,
Sacha Trifunovic |
HS 11 |
|
SA-2011-35 |
|
User Behavior Profiling using Smartphones |
|
M |
Sacha Trifunovic |
FS 11 |
|
MA-2011-06 |
|
Extensions to FACT (Flow-Based Approach for Connectivity Tracking) [confidential] |
|
S |
Dominik Schatzmann,
Wolfgang Mühlbauer |
FS 11 |
,
|
SA-2011-14 |
|
Social Data Mining on Smartphones |
|
S |
Sacha Trifunovic |
FS 11 |
|
SA-2011-09 |
|
Virtual Wishlist |
|
G |
Sacha Trifunovic |
FS 11 |
,
,
|
GA-2011-02 |
|
Implementation of a Disaster Mode to Maintain Twitter Communications in Times of
Network Outages |
Ad-hoc-Networks |
M |
Theus Hossmann,
Franck Legendre |
FS 11 |
|
MA-2011-02 |
|
Inferring Shared Interests from Tweets |
Ad-hoc-Networks |
S |
Theus Hossmann,
Franck Legendre |
FS 11 |
|
SA-2011-20 |
|
Lightweight Autonomic Network Architecture |
Embedded Systems |
M |
Ariane Trammell,
Wolfgang Mühlbauer |
FS 11 |
|
MA-2011-01 |
|
Platform-Independent Software Development for Real-Time Embedded Systems [confidential] |
Embedded Systems |
M |
Ehud Ben-Porat |
FS 11 |
|
MA-2011-26 |
|
Extending HAPviewer: Time Window, Flow Classification, and Geolocation |
Network Security |
M |
Eduard Glatz,
Xenofontas Dimitropoulos |
FS 11 |
|
MA-2011-12 |
|
Practical Private Set Operations using Probabilistic Data Structures [confidential] |
Network Security |
M |
Martin Burkhart,
Dilip Many |
FS 11 |
|
MA-2011-07 |
|
Security Assessment of Infection Incidents in the ETH University Campus |
Network Security |
M |
Elias Raftopoulos,
Xenofontas Dimitropoulos |
FS 11 |
|
MA-2011-03 |
|
Security Monitoring at Enterprise Level [confidential] |
Network Security |
M |
David Gugelmann |
FS 11 |
|
MA-2011-05 |
|
Network Coding for Opportunistic Content Delivery Networks (o-CDN) [confidential] |
Peer-to-Peer Networks |
S |
Gabriel Popa,
Kavé Salamatian |
FS 11 |
|
SA-2011-18 |
|
Performance Evaluation of OpenFlow Switches |
Performance Evaluation |
S |
Jose F. Mingorance-Puga,
Wolfgang Mühlbauer |
FS 11 |
|
SA-2011-07 |
|
Historische Entwicklung der Sicherheit in Wireless Netzwerken |
Wireless Security |
G |
David Gugelmann,
Dominik Schatzmann |
FS 11 |
,
|
GA-2011-04 |
|
Experimental Performance Evaluation of Routing In Delay Tolerant Networks |
Ad-hoc-Networks |
M |
Theus Hossmann,
Franck Legendre |
HS 10 |
|
MA-2010-16 |
|
Identification of Connectivity Issues in Large Networks using Data Plane |
Internet Measurement |
S |
Dominik Schatzmann,
Wolfgang Mühlbauer |
HS 10 |
|
SA-2010-21 |
|
Wirefox – A Measurement Plug-In for Firefox |
Internet Measurement |
S |
Dominik Schatzmann,
Wolfgang Mühlbauer |
HS 10 |
|
SA-2010-20 |
|
Evaluating and Improving the Detection of Internet Background Radiation |
Network Security |
S |
Eduard Glatz,
Xenofontas Dimitropoulos |
HS 10 |
|
SA-2010-23 |
|
SMS-based Certificate Authority |
Network Security |
S |
Sacha Trifunovic |
HS 10 |
|
SA-2010-25 |
|
Custom Media Player with Integrated Feedback |
Peer-to-Peer Networks |
S |
Sacha Trifunovic |
HS 10 |
|
SA-2010-24 |
|
Information Dissemination in Vehicular Networks |
Wireless Mesh Networks |
M |
Franck Legendre,
Thrasyvoulos Spyropoulos |
HS 10 |
|
MA-2010-11 |
|
Wireless Link Quality Estimation in Mobile Networks |
Wireless Mesh Networks |
M |
Vincent Lenders,
Franck Legendre |
HS 10 |
|
MA-2010-17 |
|
Studying Social-driven Mobility - Comparing Face-to-Face Meetings to Online Social
Network Activity |
|
M |
Thrasyvoulos Spyropoulos,
Franck Legendre |
FS 10 |
|
MA-2010-06 |
|
Distributed Challenge Analysis and Remediation in Wireless Mesh Networks |
|
M |
Merkourios Karaliopoulos |
FS 10 |
|
MA-2010-10 |
|
Multi-Sensor Monitoring for Host Security Characterization [confidential] |
End-point Security |
M |
Elias Raftopoulos,
Bernhard Tellenbach |
FS 10 |
|
MA-2010-04 |
|
SEBPS v1.0: Designing a Secure and Maintainable End-User Platform |
End-point Security |
S |
Lukas Ruf |
FS 10 |
|
SA-2010-09 |
|
Improving the privacy of ZigBee / IEEE 802.15.4 with Dynamic and Secret Spreading Sequences [confidential] |
Wireless Security |
M |
Franck Legendre |
FS 10 |
|
MA-2010-01 |
|
Vulnerability Evaluation of Proportional Fairness Scheduling to Retransmissions
Attacks |
Wireless Security |
S |
Ehud Ben-Porat |
FS 10 |
|
SA-2010-02 |
|
Implementation and Evaluation of a CNA-Based DTN Routing Protocol |
|
S |
Theus Hossmann,
Franck Legendre |
HS 09 |
|
SA-2009-30 |
|
Sports Reporter Application for future Mobile Networks |
|
M |
Ariane Trammell,
Franck Legendre |
HS 09 |
|
MA-2009-16 |
|
Path Length vs Distance in Mobile Wireless Networks |
Ad-hoc-Networks |
S |
Simon Heimlicher,
Merkourios Karaliopoulos |
HS 09 |
|
SA-2009-33 |
|
Privacy in Online Social Networks |
External Projects |
M |
Martin Burkhart |
HS 09 |
|
MA-2009-11 |
|
A Software-Based Trusted Platform Module |
Network Security |
M |
Mario Strasser |
HS 09 |
|
MA-2009-10 |
|
Virtual Network Topology for Data Centers [confidential] |
Network Security |
S |
Bernhard Plattner |
HS 09 |
|
SA-2009-34 |
|
Resilience of wireless mesh networks to node misbehaviors |
Wireless Mesh Networks |
S |
Merkourios Karaliopoulos,
Gabriel Popa |
HS 09 |
|
SA-2009-36 |
|
Jamming Detection and Performance of Rate Switching under Jamming |
Wireless Security |
M |
Mario Strasser,
Franck Legendre |
HS 09 |
,
|
MA-2009-15 |
|
A Security Forensics Framework |
Wireless Security |
S |
Mario Strasser |
HS 09 |
|
SA-2009-32 |
|
Aufbau eines OpenFlow Netzwerkes (report) |
|
G |
Bernhard Plattner,
Ariane Trammell |
FS 09 |
,
|
GA-2009-05 |
|
Erstellen einer Dokumentation für das PPS Voice over IP (report) |
|
G |
Bernhard Distl |
FS 09 |
,
,
,
|
GA-2009-01 |
|
Zurinet - Using Public Transportation as a DTN Backbone |
Ad-hoc-Networks |
M |
Thrasyvoulos Spyropoulos,
Franck Legendre |
FS 09 |
|
MA-2009-06 |
|
Ground truth analysis of anomalies in traffic feature distributions |
Network Security |
G |
Bernhard Tellenbach |
FS 09 |
|
GA-2009-04 |
|
Evaluating and Improving TES II [confidential] |
Network Security |
S |
Bernhard Tellenbach |
FS 09 |
|
SA-2009-17 |
|
Event Correlation Engine |
Network Security |
M |
Bernhard Tellenbach |
FS 09 |
|
MA-2009-01 |
|
Privacy-Preserving Collaboration in Network Security |
Network Security |
M |
Martin Burkhart,
Mario Strasser |
FS 09 |
|
MA-2009-02 |
|
SIAN Software zur Identifikation von Applikationsklassen in NetFlow |
Network Security |
G |
Eduard Glatz,
Bernhard Tellenbach |
FS 09 |
,
|
GA-2009-03 |
|
Development of software tools to facilitate management and experimentation with the
TIK wireless testbed |
Wireless Mesh Networks |
S |
Merkourios Karaliopoulos |
FS 09 |
|
SA-2009-12 |
|
Design and Implementation of SAFT on ANA II |
|
S |
Ariane Trammell,
Simon Heimlicher |
HS 08 |
|
SA-2008-21 |
|
Interconnection of Different Network Architectures |
|
S |
Ariane Trammell,
Martin May |
HS 08 |
|
SA-2008-22 |
|
Performance Enhancement of an Intersection Assistance System by Integrating WLAN
Ad-Hoc Network with Multi-Hop Capabilities |
|
M |
Thrasyvoulos Spyropoulos |
HS 08 |
|
MA-2008-20 |
|
Autonomic Identifier Allocation for ANA (AIA) |
|
S |
Ariane Trammell,
Martin May |
HS 08 |
|
SA-2008-23 |
|
Broadcast Synchonization in Wireless Ad Hoc Podcasting |
Ad-hoc-Netze |
S |
Franck Legendre |
HS 08 |
|
SA-2008-17 |
|
Lightweight Information System Technology LIST |
Ad-hoc-Netze |
S |
Bernhard Distl,
Franck Legendre |
HS 08 |
,
|
SA-2008-19 |
|
Secure Content Dissemination in Opportunistic Networks |
Ad-hoc-Netze |
M |
Bernhard Distl,
Franck Legendre |
HS 08 |
,
|
MA-2008-27 |
|
Opportunistic Networks with ANA |
Ad-hoc-Netze |
M |
Theus Hossmann,
Franck Legendre |
HS 08 |
|
MA-2008-23 |
|
Secondary network activity and traffic of SMTP sender hosts [confidential] |
Network Security |
M |
Dominik Schatzmann,
Martin Burkhart |
HS 08 |
|
MA-2008-24 |
|
Evaluating and Improving TES [confidential] |
Network Security |
M |
Bernhard Tellenbach,
Dominik Schatzmann |
HS 08 |
|
MA-2008-28 |
|
Extending Flame: Anomaly Characterization and Extraction [confidential] |
Network Security |
M |
Daniela Brauckhoff,
Arno Wagner |
HS 08 |
|
MA-2008-25 |
|
Invasion of Privacy Using Fingerprinting Attacks |
Network Security |
M |
Martin Burkhart,
Dominik Schatzmann |
HS 08 |
|
MA-2008-22 |
|
A mobile payment system using an NFC mobile phone [confidential] |
Wireless Security |
M |
Bernhard Plattner |
HS 08 |
|
MA-2008-17 |
|
Jamming Detection inWireless Ad Hoc Networks |
Wireless Security |
M |
Vincent Lenders,
Franck Legendre |
HS 08 |
|
MA-2008-21 |
|
Botnet Detection based on NetFlow Traces [confidential] |
|
M |
Dominik Schatzmann |
FS 08 |
|
MA-2008-14 |
|
Design and Implementation of SAFT on ANA |
|
S |
Ariane Trammell,
Simon Heimlicher |
FS 08 |
|
SA-2008-12 |
|
Wireless Ad Hoc Podcasting on Symbian |
Ad-hoc-Netze |
D |
Vincent Lenders,
Bernhard Distl |
FS 08 |
|
DA-2008-03 |
|
Mobility Modeling of Swarm Robots |
Ad-hoc-Netze |
S |
Merkourios Karaliopoulos |
FS 08 |
|
SA-2008-07 |
|
Hop-by-hop Transport on Linux [confidential] |
Ad-hoc-Netze |
M |
Simon Heimlicher,
Ariane Trammell |
FS 08 |
|
MA-2008-10 |
|
SimBet |
Ad-hoc-Netze |
S |
Thrasyvoulos Spyropoulos |
FS 08 |
|
SA-2008-15 |
|
Redundancy for Compact Turbine Controller |
External Projects |
D |
Rainer Baumann |
FS 08 |
|
DA-2008-01 |
|
Lightweight Detection of Malicious Traffic in Wireless Mesh Networks |
External Projects |
M |
Mario Strasser |
FS 08 |
|
MA-2008-15 |
|
Analysis and Modeling of Internet Epidemics |
Network Security |
M |
Daniela Brauckhoff,
Bernhard Tellenbach |
FS 08 |
|
MA-2008-01 |
|
Towards Revealing Attackers Intent by Automatically Decrypting Network
Traffic |
Network Security |
M |
Bernhard Tellenbach |
FS 08 |
|
MA-2008-08 |
|
Characterizing network activity of mail servers [confidential] |
Network Security |
S |
Dominik Schatzmann,
Bernhard Tellenbach |
FS 08 |
|
SA-2008-11 |
|
Implementation of an Anomaly Injection Framework |
Network Security |
D |
Daniela Brauckhoff,
Martin Burkhart |
FS 08 |
|
DA-2008-04 |
|
Next Generation / Secure E-Banking [confidential] |
Network Security |
M |
Rainer Baumann |
FS 08 |
|
MA-2008-04 |
|
Rating Autonomous Systems [confidential] |
Network Security |
M |
Bernhard Tellenbach,
Dominik Schatzmann |
FS 08 |
|
MA-2008-07 |
|
Sharing of Traffic Measurements with Privacy Based on Multi-Party Computation [confidential] |
Network Security |
M |
Martin Burkhart,
Mario Strasser |
FS 08 |
|
MA-2008-02 |
|
Signature-based Extrusion Detection |
Network Security |
M |
Bernhard Tellenbach |
FS 08 |
|
MA-2008-06 |
|
Using Air Traffic as a Delay-Tolerant Networking Backbone |
Peer-to-Peer Networks |
S |
Franck Legendre,
Martin May |
FS 08 |
|
SA-2008-01 |
|
Security of Field-based Routing |
Wireless Security |
S |
Mario Strasser |
FS 08 |
|
SA-2008-08 |
|
Development of a mobile MMOG |
Ad-hoc-Netze |
S |
Martin May |
HS 07 |
,
|
SA-2007-66 |
|
Game-Based Learning and its Application in Business Environments |
External Projects |
M |
Bernhard Plattner,
Rainer Baumann |
HS 07 |
|
MA-2007-34 |
|
Dissecting Port 80 Traffic [confidential] |
Network Security |
M |
Bernhard Tellenbach,
Dominik Schatzmann |
HS 07 |
|
MA-2007-43 |
|
Localization of Known Anomaly Types in NetFlow Traces |
Network Security |
S |
Daniela Brauckhoff,
Arno Wagner |
HS 07 |
|
SA-2007-54 |
|
Theft and Misuse Protection for Anonymous Credentials |
Network Security |
M |
Bernhard Tellenbach |
HS 07 |
|
MA-2007-42 |
|
New Protocols and Applications for the Future Internet |
Reconfigurable Computing |
M |
Theus Hossmann,
Martin May |
HS 07 |
|
MA-2007-39 |
|
Secure Node Monitoring in WSNs [confidential] |
Wireless Security |
M |
Mario Strasser |
HS 07 |
|
MA-2007-35 |
|
Call Route Discovery with Asterisk / DUNDi |
|
S |
Ulrich Fiedler |
SS 07 |
André Wangler |
SA-2007-58 |
|
The ANA Project - Development of the ANA-Core Software |
|
M |
Theus Hossmann |
SS 07 |
|
MA-2007-38 |
|
Experimentation and evaluation of routing metrics for multi-hop ad-hoc wireless
networks on an indoor wireless testbed |
Ad-hoc-Netze |
S |
Georgios Parissidis |
SS 07 |
|
SA-2007-39 |
|
Topology Estimation in Mobile Ad Hoc Networks |
Ad-hoc-Netze |
M |
Theus Hossmann |
SS 07 |
|
MA-2007-37 |
|
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks |
Ad-hoc-Netze |
M |
Rainer Baumann |
SS 07 |
|
MA-2007-13 |
|
Analyzing network traffic from the SWITCH network from 2003 until today |
Network Security |
M |
Bernhard Tellenbach |
SS 07 |
|
MA-2007-12 |
|
Anomaly Analysis using Host-behavior Clustering |
Network Security |
M |
Daniela Brauckhoff |
SS 07 |
|
MA-2007-31 |
|
Application Detection and Modelling using Network Traces |
Network Security |
M |
Bernhard Tellenbach |
SS 07 |
|
MA-2007-14 |
|
Towards Automated Exploit Signature Generation using Honeypots |
Network Security |
M |
Bernhard Tellenbach |
SS 07 |
|
MA-2007-09 |
|
IEEE 802.11 Wireless Security |
Network Security |
S |
Martin May,
Bernhard Tellenbach |
SS 07 |
|
SA-2007-43 |
|
Online-Games: Traffic Analysis of Popular Game Servers (Counter Strike:
Source) |
Peer-to-Peer Networks |
S |
Martin May |
SS 07 |
|
SA-2007-42 |
|
Portierung von Topsy v3 auf den Intel Pentium 4 |
Voice over IP |
S |
Daniela Brauckhoff |
SS 07 |
|
SA-2007-19 |
|
Industrial Networks - Connecting Controllers via OPC |
|
M |
Rainer Baumann |
WS 07 |
|
MA-2007-06 |
|
Implementation of HEAT for Linux 2.6 with IPv6 |
Ad-hoc-Netze |
S |
Rainer Baumann |
WS 07 |
|
SA-2007-16 |
|
Implementation of a Field Based Routing Protocol for Wireless Mesh
Networks |
Ad-hoc-Netze |
S |
Rainer Baumann |
WS 07 |
,
|
SA-2007-03 |
|
A Framework For Transport Protocol Implementation And Evaluation On Linux 2.6 [confidential] |
Ad-hoc-Netze |
S |
Simon Heimlicher |
WS 07 |
|
SA-2007-09 |
|
Design and Analysis of Realistic Mobility Models for Wireless Mesh
Networks |
Ad-hoc-Netze |
M |
Rainer Baumann |
WS 07 |
|
MA-2007-00 |
|
Wireless Ad Hoc Podcasting with Handhelds |
Ad-hoc-Netze |
M |
Vincent Lenders |
WS 07 |
|
MA-2007-05 |
|
Porting TOPSY v3 to the IXP2400 |
Eingebettete Systeme |
S |
Lukas Ruf |
WS 07 |
,
|
SA-2007-18 |
|
Representation of XML Schema Components |
External Projects |
D |
Erik Wilde |
WS 07 |
|
DA-2007-01 |
|
Harpoon: A Flow-level Traffic Generator |
Network Security |
S |
Daniela Brauckhoff |
WS 07 |
|
SA-2007-06 |
|
Anomaly Visibility and Detectability in Sampled Traffic |
Network Security |
S |
Daniela Brauckhoff |
WS 07 |
|
SA-2007-12 |
|
Towards Exploit Signature Generation using Honeypots II |
Network Security |
S |
Bernhard Tellenbach |
WS 07 |
|
SA-2007-13 |
|
Force-based Visualization of Peer-to-peer Nodes |
Peer-to-Peer Networks |
S |
Marcel Baur |
WS 07 |
|
SA-2007-01 |
|
Erweiterung von PolyPhone um eine Infrastruktur für SIP Instant
Messaging-Dienste |
PolyPhone |
S |
Marcel Baur |
WS 07 |
|
SA-2007-02 |
|
Distributed Terminal Location Discovery in a TOWN Network |
Voice over IP |
N |
Rainer Baumann |
WS 07 |
|
NA-2007-01 |
|
3D Visualisierung von Field Based Routing (FBR) |
Ad-hoc-Netze |
S |
Rainer Baumann |
SS 06 |
|
SA-2006-14 |
|
Channel Allocation for IEEE 802.16 Mesh Networks |
Ad-hoc-Netze |
M |
Rainer Baumann |
SS 06 |
|
MA-2006-24 |
|
DSNAnalyzer: Backend for the Deployment Support Network |
Ad-hoc-Netze |
M |
Martin May |
SS 06 |
|
MA-2006-18 |
|
Evaluation of scheduling methods over multipath routing in wireless mobile Ad Hoc
networks |
Ad-hoc-Netze |
S |
Georgios Parissidis |
SS 06 |
,
|
SA-2006-26 |
|
Scalable Real-time Multiplayer Game Network Support for Orxonox |
Ad-hoc-Netze |
S |
Károly Farkas |
SS 06 |
,
|
SA-2006-31 |
|
Trace Control for Netem |
Ad-hoc-Netze |
S |
Rainer Baumann |
SS 06 |
|
SA-2006-15 |
|
Routing Algorithms for Safety Critical Wireless Sensor Networks |
Ad-hoc-Netze |
M |
Martin May |
SS 06 |
|
MA-2006-25 |
|
The Impact of the Choice of Metrics for Routing - wicht a focus on Wireless Mesh
Networking (WMN) |
Ad-hoc-Netze |
M |
Rainer Baumann,
Simon Heimlicher |
SS 06 |
|
MA-2006-13 |
|
Design and Implementation of an Emulator for the Intel IXP 2400 Network
Processor |
Eingebettete Systeme |
S |
Lukas Ruf |
SS 06 |
|
SA-2006-17 |
|
Simulative Leistungsbewertung und Entwicklung rekonfigurationsfester
Routingverfahren für mehrstufige Verbindungsnetzwerke |
Eingebettete Systeme |
M |
Lukas Ruf |
SS 06 |
Christian Zimmermann |
MA-2006-16 |
|
XPath-Unterstützung in einer Linux Shell |
ETH World Program |
S |
Erik Wilde |
SS 06 |
|
SA-2006-11 |
|
Automated Monitoring of Internet Service Provider (ISP) Topologies |
External Projects |
M |
Daniela Brauckhoff |
SS 06 |
|
MA-2006-11 |
|
An Implementation of a Byte Frequency Signature Generator Using a Gibbs
Sampler |
Network Security |
S |
Bernhard Tellenbach |
SS 06 |
|
SA-2006-21 |
|
Entropy Plug-in and Visualisation Tool |
Network Security |
S |
Arno Wagner |
SS 06 |
|
SA-2006-25 |
|
Design and Implementation of a Protocol-Aware Connection Tracker Framework |
Network Security |
S |
Bernhard Tellenbach |
SS 06 |
,
|
SA-2006-20 |
|
Access Control in a Peer-to-Peer Storage Systems |
Peer-to-Peer Networks |
M |
Marcel Baur |
SS 06 |
|
MA-2006-10 |
|
Firewall and NAT Traversal for Peer-to-Peer Storage Nodes |
Peer-to-Peer Networks |
S |
Marcel Baur |
SS 06 |
|
SA-2006-23 |
|
Implementation of the Kademlia Distributed Hash Table |
Peer-to-Peer Networks |
S |
Marcel Baur |
SS 06 |
|
SA-2006-19 |
|
Proxies in PromethOS |
Service Provisioning |
S |
Lukas Ruf |
SS 06 |
|
SA-2006-16 |
|
A Simple Overlay Platform for Distributed Monitoring |
|
D |
Bernhard Plattner |
WS 06 |
|
DA-2006-06 |
|
Worm Outbreak Detection in the Internet Backbone |
|
D |
Arno Wagner |
WS 06 |
|
DA-2006-03 |
|
Proaktive Verhinderung von Attacken auf Applikationen |
|
M |
Bernhard Plattner |
WS 06 |
,
|
MA-2006-12 |
|
Real-time Monitoring and Control for large Server Clusters |
|
D |
Bernhard Plattner |
WS 06 |
|
DA-2006-07 |
|
Ad Hoc Communication with Handhelds |
Ad-hoc-Netze |
S |
Vincent Lenders |
WS 06 |
,
|
SA-2006-02 |
|
BlueLocation II - A Localization Infrastructure for Blutooth Enabled Mobile
Devices |
Ad-hoc-Netze |
S |
Vincent Lenders |
WS 06 |
,
|
SA-2006-03 |
|
Implementation of SAFT [confidential] |
Ad-hoc-Netze |
S |
Simon Heimlicher,
Rainer Baumann |
WS 06 |
,
|
SA-2006-08 |
|
Mobility Prediction in MANETs |
Ad-hoc-Netze |
M |
Károly Farkas |
WS 06 |
|
MA-2006-08 |
|
Multiplayer Gaming in Mobile Adhoc Networks |
Ad-hoc-Netze |
S |
Károly Farkas |
WS 06 |
,
|
SA-2006-04 |
|
Routing in Ad Hoc Networks with mobile Users |
Ad-hoc-Netze |
M |
Vincent Lenders |
WS 06 |
|
MA-2006-02 |
|
Management of Distributed Services in MANETs |
Ad-hoc-Netze |
M |
Károly Farkas |
WS 06 |
Eduardo Silva |
MA-2006-07 |
|
Student Webportal for Courses |
ETH World Program |
S |
Rainer Baumann |
WS 06 |
|
SA-2006-05 |
|
Web Based Services (WBS) |
ETH World Program |
S |
Keno Albrecht |
WS 06 |
|
SA-2006-09 |
|
Passive Measurement of Network Quality (External) |
External Projects |
M |
Arno Wagner |
WS 06 |
|
MA-2006-03 |
|
Evaluating Circuit Emulation Adapters |
External Projects |
S |
Rainer Baumann |
WS 06 |
|
SA-2006-10 |
|
Implementing a circuit emulation adapter |
|
S |
Ulrich Fiedler |
SS 05 |
|
SA-2005-34 |
|
Analysis of Dynamics in Mobile Ad-Hoc Networks |
Ad-hoc-Netze |
S |
Vincent Lenders |
SS 05 |
,
|
SA-2005-18 |
|
BlueLocation |
Ad-hoc-Netze |
S |
Vincent Lenders |
SS 05 |
|
SA-2005-17 |
|
BlueFramework - Application Framework for Bluetooth Enabled Mobile Phones |
Ad-hoc-Netze |
M |
Matthias Bossardt |
SS 05 |
|
MA-2005-16 |
|
Routing Protocol for a Wireless Fire Detection Network |
Ad-hoc-Netze |
S |
Martin May |
SS 05 |
|
SA-2005-35 |
|
Quality of Service for Multiplayer Game Provisioning in Mobile Ad Hoc
Networks |
Ad-hoc-Netze |
M |
Károly Farkas |
SS 05 |
|
MA-2005-18 |
|
Setting up an Ad Hoc Testbed Network |
Ad-hoc-Netze |
S |
Károly Farkas |
SS 05 |
|
SA-2005-32 |
|
Real-time Audio Data Transmission over MANETs^1 |
Ad-hoc-Netze |
S |
Rainer Baumann |
SS 05 |
|
SA-2005-36 |
|
Integration von PolyPhone in myETH |
ETH World Program |
S |
Bernhard Plattner |
SS 05 |
|
SA-2005-37 |
|
ShaRefWeb A Web Interface for the ShaRef Service |
ETH World Program |
M |
Erik Wilde |
SS 05 |
|
MA-2005-15 |
|
WebCam-Plattform für die ETH Zürich |
ETH World Program |
S |
Bernhard Plattner |
SS 05 |
,
|
SA-2005-29 |
|
Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow
Logs |
Network Security |
D |
Thomas Dübendorfer |
SS 05 |
|
DA-2005-06 |
|
Automated Attack Signature Generation: A Survey |
Network Security |
S |
Daniela Brauckhoff |
SS 05 |
|
SA-2005-38 |
|
Implementation of a Distributed Traffic Control Service using FPGAs |
Network Security |
D |
Matthias Bossardt |
SS 05 |
|
DA-2005-07 |
|
Kostenanalyse von präventiven IT-Sicherheitsmassnahmen |
Network Security |
S |
Thomas Dübendorfer |
SS 05 |
|
SA-2005-25 |
|
Web Attack Showcases for the Security Demo Lab |
Network Security |
S |
Stefan Frei |
SS 05 |
|
SA-2005-24 |
|
Service Management Procedures Supporting Distributed Services in Mobile Ad Hoc
Networks |
Service Provisioning |
M |
Károly Farkas |
SS 05 |
|
MA-2005-14 |
|
Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service
Priority? |
|
N |
Ulrich Fiedler |
WS 05 |
|
NA-2005-02 |
|
Trace-Based Network Emulation |
|
M |
Ulrich Fiedler |
WS 05 |
|
MA-2005-06 |
|
Vom Fahrgastinformations- zum Infotainmentsystem |
|
M |
Ulrich Fiedler |
WS 05 |
|
MA-2005-20 |
|
BlueDating - Dating Application for Bluetooth Enabled Mobile Phones |
Ad-hoc-Netze |
S |
Vincent Lenders |
WS 05 |
,
|
SA-2005-08 |
|
Bluetella - File Sharing for Bluetooth Enabled Mobile Phones |
Ad-hoc-Netze |
S |
Matthias Bossardt |
WS 05 |
,
|
SA-2005-03 |
|
SAFT Store And Forward Transport - Reliable Transport in Wireless Mobile Ad-hoc
Networks |
Ad-hoc-Netze |
M |
Martin May |
WS 05 |
|
MA-2005-08 |
|
Service Discovery and Routing in Mobile Ad-Hoc Networks |
Ad-hoc-Netze |
M |
Martin May |
WS 05 |
|
MA-2005-03 |
|
Energy Conserving Camera Scheduling Policies for Sensor Networks |
Ad-hoc-Netze |
M |
Matthias Bossardt |
WS 05 |
|
MA-2005-11 |
|
Management of Distributed Traffic Control Service |
Network Security |
M |
Matthias Bossardt |
WS 05 |
|
MA-2005-02 |
|
Near Real-Time Detection of Traffic Usage Rhythm Anomalies in the
Backbone |
Network Security |
D |
Thomas Dübendorfer |
WS 05 |
|
DA-2005-03 |
|
Scan Detection Based Identification of Worm-Infected Hosts |
Network Security |
M |
Arno Wagner |
WS 05 |
,
|
MA-2005-01 |
|
P2P Filesharing Traffic Identification Method Validation and
Verification |
Peer-to-Peer Networks |
S |
Arno Wagner |
WS 05 |
|
SA-2005-11 |
|
A Framework for Programming Packet Processors |
|
D |
Lukas Ruf |
SS 04 |
|
DA-2004-01 |
|
Communication and Management Infrastructure for Services on Active Router |
|
S |
Matthias Bossardt |
SS 04 |
,
|
SA-2004-27 |
|
Mapping Services Onto Hierarchy-extended Active Network Nodes |
|
D |
Lukas Ruf |
SS 04 |
|
DA-2004-13 |
|
Parallel Image Registration in Distributed Memory Environments |
|
M |
Placi Flury |
SS 04 |
|
MA-2004-05 |
|
VSETH Informations-System |
|
S |
Benjamin Stäger |
SS 04 |
|
SA-2004-34 |
|
Analysis of Sobig.F and Blaster Worm Characteristics |
Network Security |
S |
Thomas Dübendorfer |
SS 04 |
|
SA-2004-23 |
|
Detecting Bots in Internet Relay Chat Systems |
Network Security |
S |
Thomas Dübendorfer |
SS 04 |
,
|
SA-2004-29 |
|
Kostenmodell zu präventiven IT-Sicherheitsmassnahmen |
Network Security |
S |
Thomas Dübendorfer |
SS 04 |
|
SA-2004-28 |
|
Secure Java Code Interpreter for Public Utility Computing |
Network Security |
N |
Thomas Dübendorfer |
SS 04 |
|
NA-2004-01 |
|
Visualisation of Client/Server Behaviour |
Network Security |
S |
Thomas Dübendorfer |
SS 04 |
|
SA-2004-24 |
|
Distributed Accounting for P2P Content Services |
Peer-to-Peer Networks |
D |
David Hausheer |
SS 04 |
|
DA-2004-15 |
|
P2P Population Tracking and Traffic Characterization of Current P2P File-sharing
Systems |
Peer-to-Peer Networks |
M |
Arno Wagner |
SS 04 |
|
MA-2004-04 |
|
Implementation eines Auktions-basierten Pricing Mechanismus für Peer-to-Peer
Systeme |
Peer-to-Peer Networks |
S |
David Hausheer |
SS 04 |
|
SA-2004-26 |
|
Service Provisioning in Mobile Ad Hoc Networks |
Service Provisioning |
M |
Károly Farkas |
SS 04 |
|
MA-2004-09 |
|
A Lightweight Packet Capturer for High-Speed Links |
|
S |
Thomas Dübendorfer |
WS 04 |
|
SA-2004-08 |
|
Patterns for Service Deployment in Programmable Networks |
|
D |
Matthias Bossardt |
WS 04 |
Daniela Brauckhoff |
DA-2004-03 |
|
Analysis of Internet Relay Chat Usage by DDoS Zombies |
|
M |
Thomas Dübendorfer |
WS 04 |
|
MA-2004-01 |
|
Multi-objective Routing mit Ameisenalgorithmen |
|
S |
Placi Flury |
WS 04 |
|
SA-2004-02 |
|
Design and Implementation of an Emulator for the IBM PowerNP 4GS3 |
|
D |
Lukas Ruf |
WS 04 |
|
DA-2004-08 |
|
Kosten- Nutzenanalyse des Neptun Projekts |
|
S |
Bernhard Plattner |
WS 04 |
|
SA-2004-20 |
|
P2P Filesharing Systems: Real World NetFlow Traffic Characterization |
|
B |
Arno Wagner |
WS 04 |
|
BA-2004-01 |
|
Parallel distributed filesystem with metadata database |
|
D |
Bernhard Plattner |
WS 04 |
,
|
DA-2004-11 |
|
Plug-ins for DDoS Attack Detection in Realtime |
|
S |
Thomas Dübendorfer |
WS 04 |
|
SA-2004-19 |
|
Resource Controlled Interprocessor Communication On NP-based Active Network
Nodes |
|
D |
Lukas Ruf |
WS 04 |
|
DA-2004-17 |
|
Active Network Service mit Netlink |
|
S |
Matthias Bossardt |
WS 04 |
|
SA-2004-17 |
|
Towards Resilience Against Node Failures in Overlay Multicast Schemes |
|
S |
Kostas Katrinis |
WS 04 |
|
SA-2004-14 |
|
Integrity Protection for Secure Networked Storage |
Network Security |
D |
Marcel Waldvogel |
WS 04 |
|
DA-2004-16 |
|
A Distributed Monitoring System for large, heterogeneous WLANs |
|
D |
Vincent Lenders |
SS 03 |
|
DA-2003-30 |
|
Ant Based Routing System |
|
S |
Placi Flury |
SS 03 |
,
|
SA-2003-21 |
|
Aufbau und Betrieb eines Konferenzplanungssystems für die WWW2003 |
|
S |
Erik Wilde |
SS 03 |
,
|
SA-2003-33 |
|
Configuration of SIP-based Conference Servers |
|
S |
Kostas Katrinis |
SS 03 |
|
SA-2003-32 |
|
DDoS Attack Detection Based on Netflow Logs |
|
S |
Thomas Dübendorfer |
SS 03 |
|
SA-2003-35 |
|
Distributed Content-based Accounting and Charging in P2P |
|
D |
David Hausheer |
SS 03 |
|
DA-2003-33 |
|
Bluetella: A Java Application for New Mobile Phones |
|
S |
Matthias Bossardt |
SS 03 |
|
SA-2003-19 |
|
Lookup in Peer-to-Peer Networks |
|
S |
Jan Mischke |
SS 03 |
|
SA-2003-29 |
|
Design and implementation of a modular emulator for Topsy |
|
D |
Lukas Ruf |
SS 03 |
|
DA-2003-25 |
|
Realtime UDP NetFlow Processing Framework |
|
D |
Thomas Dübendorfer |
SS 03 |
|
DA-2003-26 |
|
Reputation and Trust Management in Ad Hoc Networks with Misbehaving Nodes |
|
D |
Vincent Lenders |
SS 03 |
|
DA-2003-27 |
|
Search in Peer-to-Peer Networks |
|
S |
Jan Mischke |
SS 03 |
|
SA-2003-34 |
|
Simulation-Based Analysis of Internet Worm Characteristics |
|
S |
Thomas Dübendorfer |
SS 03 |
|
SA-2003-26 |
|
Strukturierung, Navigation und Suche in semantischen Netzen |
|
S |
Placi Flury |
SS 03 |
|
SA-2003-24 |
|
Wirtschaftliche Auswirkungen von DDoS Attacken auf Backbone-Provider |
|
S |
Thomas Dübendorfer |
SS 03 |
,
|
SA-2003-27 |
|
Pattern-based service deployment in active networks |
|
S |
Matthias Bossardt |
WS 03 |
,
|
SA-2003-13 |
|
Analyzing MorphMix - a Peer-to-Peer based System for Anonymous Internet
Access |
|
S |
Marc Rennhard |
WS 03 |
|
SA-2003-12 |
|
Database-driven XML-anabled Bibliography Management System |
|
D |
Erik Wilde |
WS 03 |
,
|
DA-2003-05 |
|
Comparison of Centralized (Client/Server) and Decentralized (Peer-to-peer)
Networking |
|
S |
Jan Mischke |
WS 03 |
|
SA-2003-16 |
|
Design and implementation of a Presentation Tool for an Educational Delivery
Platform |
|
S |
Georgios Parissidis |
WS 03 |
|
SA-2003-08 |
|
Desktop Firewalls and Intrunsion Detection |
|
D |
Marc Rennhard |
WS 03 |
|
DA-2003-22 |
|
Einsatz und Programmierung des IBM NP4GS3 Netzwerkprozessors fuer
AktiveNetzwerkknoten unter Linux |
|
D |
Lukas Ruf |
WS 03 |
|
DA-2003-12 |
|
Integration of a Proof of Delivery in a WAP Content Billing Architecture for
Third Party Services |
|
D |
Burkhard Stiller |
WS 03 |
|
DA-2003-18 |
|
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP
Keyservers |
|
S |
Keno Albrecht |
WS 03 |
|
SA-2003-04 |
|
PromethOS v2.0 - Memory Resource Control in the Linux 2.4 Kernel |
|
D |
Lukas Ruf |
WS 03 |
|
DA-2003-24 |
|
MPEG-4 FGS Codec |
|
D |
Kostas Katrinis |
WS 03 |
|
DA-2003-20 |
|
Network Troubleshooting Expert System |
|
D |
Marc Rennhard |
WS 03 |
|
DA-2003-21 |
|
Non-Repudiation of Service Consumption in MobyDick Networks |
|
D |
Hasan Hasan |
WS 03 |
|
DA-2003-01 |
|
Simulation of a Data Centric Routing Protocol for Mobile Ad Hoc
Networks |
|
D |
Vincent Lenders |
WS 03 |
|
DA-2003-07 |
|
Secure E-MAIL |
|
D |
Nathalie Weiler |
WS 03 |
|
DA-2003-13 |
|
Service Composition for Active Networks |
|
D |
Matthias Bossardt |
WS 03 |
,
|
DA-2003-06 |
|
Simulative Performance Optimization for TCP over UMTS |
|
D |
Burkhard Stiller |
WS 03 |
|
DA-2003-19 |
|
Trace QoS A tool for locating QoS failures on an Internet path |
|
D |
Placi Flury |
WS 03 |
|
DA-2003-16 |
|
Toolkit für Konferenzprogrammverwaltung und -personalisierung |
|
D |
Erik Wilde |
WS 03 |
,
|
DA-2003-03 |
|
A Compact Syntax for XML Schema |
|
D |
Erik Wilde |
WS 03 |
|
DA-2003-04 |