Internships

Are you looking for a master thesis or an internship? Here are some ideas...

Big Data Visualization with d3.js

Intrusion and Advanced Persistent Threat detection systems analyze daily enormous amounts of data. The evidences produced by such systems need to be presented in a clear and understandable way to an analyst so he/she can easily filter out important suspicious behavior and what is just regular network traffic. To do this an intuitive and readable visualization of the data must be present for the expert.

Read more

Cyber Range : Comparison

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.

Read more

Cyber Range : Framework

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is used to run network related exercises and tests.

Read more

Garner

Garner is a mobile application repository that gathers application packages from the Apple App Store and Google Play Store and extracts useful information about them. Users can use Garner's web interface to

Read more

GitLab monitoring and security

GitLab is a powerful source code management software that allows to manage the complete DevOps lifecycle: it offers code management with git, jobs and pipelines to test and deploy the code, operations monitoring and issue tracking to plan the next release.

Read more

Network security using the P4 language

Programming Protocol-independent Packet Processors (P4) is a domain-specific language for network devices, specifying how data plane devices (switches, NICs, routers, filters, etc.) process packets.

Read more

Rogue wifi AP detection with Snappy

Open wifi is quite common today. The danger is that a hacker may create a fake open wifi access point (AP) to capture user traffic. A tool called Snappy allows apparently to fingerprint wifi access points, so one can easily detect roge wifi access points.

Read more

This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept