Project Seminar
About the Project Seminar
In this seminar, students are tasked with crafting a scholarly paper on a current topic within IT security. Through lectures, discussions, and individual guidance, they'll learn to identify pertinent research gaps, employ data collection and analysis methods, and articulate their findings in a coherent academic format.Recommendation
Due to the limited length of the semester, we recommend secondary research such as a systematic literature review.Previous semesters have demonstrated that the project seminar serves as a valuable precursor to the subsequent master's thesis. For instance, you can empirically investigate research gaps identified during the project seminar in your master's thesis.
Procedure, form and evaluation
Details about the evaluation criteria for papers are available here.Topics
Topics may encompass anything related to current IT security challenges.If you are interested in one of our thesis topics, conducting secondary research about this topic is a great means of getting familiar with the topic and identifying avenues for future research.
In addition, this page gives suggestions for project seminar topics related to the seclab's research areas.
You can always come up with your own ideas. Just keep in mind that the semester is short and primary research usually takes longer.
Title | Advisor | Type |
---|---|---|
Inclusive Security - How Accessible Are Modern (Multi-Factor) Authentication Methods? | Erwin Kupris | Seminar Paper |
The Future of eduID - Building a Secure and Scalable Educational Identity | Erwin Kupris | Seminar Paper |
eIDAS 2.0 is here - How Will it Reshape the Digital Identity Landscape? | Erwin Kupris | Seminar Paper |
FedCM for Research and Education - Designing Profiles for SAML2.0 and OpenID Connect | Erwin Kupris | Seminar Paper |
Digital Credentials and FedCM - How Will These APIs Shape the Future of Digital Identity? | Erwin Kupris | Seminar Paper |
The State of Federated Identity - Current Insights and Open Questions | Erwin Kupris | Seminar Paper |
OpenID Federation for Research and Education - Mapping the Trust Landscape | Erwin Kupris | Seminar Paper |
Is It Time to Move on From SAML2.0? Lessons Learned and Best Practices | Erwin Kupris | Seminar Paper |
Self-Sovereign Identity vs. Federated Management - Complementary or Conflicting? | Erwin Kupris | Seminar Paper |
The European Digital Identity Wallet - What We Know So Far and Next Steps | Erwin Kupris | Seminar Paper |
Threat Hunting with MITRE ATT&CK - A Review of Detection Strategies and Tactical Applications | Marleen Steinhoff | Seminar Paper |
Evolution and Application of the MITRE ATT&CK Framework - A Systematic Literature Review | Marleen Steinhoff | Seminar Paper |
Connect the dots - Approaches for association of Cyber Threat Intelligence data | Marleen Steinhoff | Seminar Paper |
Same, same, but different - Knowledge Graph structures for Cyber Threat Intelligence data | Marleen Steinhoff | Seminar Paper |
State of Knowledge of Large Language Models for information extraction tasks | Marleen Steinhoff | Seminar Paper |
Enhancing Cyber Security with Retrieval Augmented Generation - A Systematic Review of LLM Applications | Marleen Steinhoff | Seminar Paper |