Project Seminar
About the Project Seminar
In this seminar, students are tasked with crafting a scholarly paper on a current topic within IT security. Through lectures, discussions, and individual guidance, they'll learn to identify pertinent research gaps, employ data collection and analysis methods, and articulate their findings in a coherent academic format.Recommendation
Due to the limited length of the semester, we recommend secondary research such as a systematic literature review.Previous semesters have demonstrated that the project seminar serves as a valuable precursor to the subsequent master's thesis. For instance, you can empirically investigate research gaps identified during the project seminar in your master's thesis.
Procedure, form and evaluation
Details about the evaluation criteria for papers are available here.Topics
Topics may encompass anything related to current IT security challenges.If you are interested in one of our thesis topics, conducting secondary research about this topic is a great means of getting familiar with the topic and identifying avenues for future research.
In addition, this page gives suggestions for project seminar topics related to the seclab's research areas.
You can always come up with your own ideas. Just keep in mind that the semester is short and primary research usually takes longer.
Title | Advisor |
---|---|
Inclusive Security - How Accessible Are Modern (Multi-Factor) Authentication Methods? | Erwin Kupris |
The Future of eduID - Building a Secure and Scalable Educational Identity | Erwin Kupris |
eIDAS 2.0 is here - How Will it Reshape the Digital Identity Landscape? | Erwin Kupris |
FedCM for Research and Education - Designing Profiles for SAML2.0 and OpenID Connect | Erwin Kupris |
Digital Credentials and FedCM - How Will These APIs Shape the Future of Digital Identity? | Erwin Kupris |
The State of Federated Identity - Current Insights and Open Questions | Erwin Kupris |
OpenID Federation for Research and Education - Mapping the Trust Landscape | Erwin Kupris |
Is It Time to Move on From SAML2.0? Lessons Learned and Best Practices | Erwin Kupris |
Self-Sovereign Identity vs. Federated Management - Complementary or Conflicting? | Erwin Kupris |
The European Digital Identity Wallet - What We Know So Far and Next Steps | Erwin Kupris |
Threat Hunting with MITRE ATT&CK - A Review of Detection Strategies and Tactical Applications | Marleen Steinhoff |
Evolution and Application of the MITRE ATT&CK Framework - A Systematic Literature Review | Marleen Steinhoff |
Connect the dots - Approaches for association of Cyber Threat Intelligence data | Marleen Steinhoff |
Same, same, but different - Knowledge Graph structures for Cyber Threat Intelligence data | Marleen Steinhoff |
State of Knowledge of Large Language Models for information extraction tasks | Marleen Steinhoff |
Enhancing Cyber Security with Retrieval Augmented Generation - A Systematic Review of LLM Applications | Marleen Steinhoff |