Project Seminar

About the Project Seminar

In this seminar, students are tasked with crafting a scholarly paper on a current topic within IT security. Through lectures, discussions, and individual guidance, they'll learn to identify pertinent research gaps, employ data collection and analysis methods, and articulate their findings in a coherent academic format.

Recommendation

Due to the limited length of the semester, we recommend secondary research such as a systematic literature review.
Previous semesters have demonstrated that the project seminar serves as a valuable precursor to the subsequent master's thesis. For instance, you can empirically investigate research gaps identified during the project seminar in your master's thesis.

Procedure, form and evaluation

Details about the evaluation criteria for papers are available here.

Topics

Topics may encompass anything related to current IT security challenges.
If you are interested in one of our thesis topics, conducting secondary research about this topic is a great means of getting familiar with the topic and identifying avenues for future research.
In addition, this page gives suggestions for project seminar topics related to the seclab's research areas.
You can always come up with your own ideas. Just keep in mind that the semester is short and primary research usually takes longer.
Title Advisor
Inclusive Security - How Accessible Are Modern (Multi-Factor) Authentication Methods? Erwin Kupris
The Future of eduID - Building a Secure and Scalable Educational Identity Erwin Kupris
eIDAS 2.0 is here - How Will it Reshape the Digital Identity Landscape? Erwin Kupris
FedCM for Research and Education - Designing Profiles for SAML2.0 and OpenID Connect Erwin Kupris
Digital Credentials and FedCM - How Will These APIs Shape the Future of Digital Identity? Erwin Kupris
The State of Federated Identity - Current Insights and Open Questions Erwin Kupris
OpenID Federation for Research and Education - Mapping the Trust Landscape Erwin Kupris
Is It Time to Move on From SAML2.0? Lessons Learned and Best Practices Erwin Kupris
Self-Sovereign Identity vs. Federated Management - Complementary or Conflicting? Erwin Kupris
The European Digital Identity Wallet - What We Know So Far and Next Steps Erwin Kupris
Threat Hunting with MITRE ATT&CK - A Review of Detection Strategies and Tactical Applications Marleen Steinhoff
Evolution and Application of the MITRE ATT&CK Framework - A Systematic Literature Review Marleen Steinhoff
Connect the dots - Approaches for association of Cyber Threat Intelligence data Marleen Steinhoff
Same, same, but different - Knowledge Graph structures for Cyber Threat Intelligence data Marleen Steinhoff
State of Knowledge of Large Language Models for information extraction tasks Marleen Steinhoff
Enhancing Cyber Security with Retrieval Augmented Generation - A Systematic Review of LLM Applications Marleen Steinhoff