Internships

Are you looking for a master thesis or an internship? Here are some ideas...

Auto Multiple Choice (AMC) with elimination testing

AMC, for Auto Multiple Choice, is an open source software that allows a teacher to create multiple-choice tests in a very simple way. But, the most interesting part of AMC, is the ability to automatically correct the tests of all students.

Read more

Big Data Visualization with d3.js

Intrusion and Advanced Persistent Threat detection systems analyze daily enormous amounts of data. The evidences produced by such systems need to be presented in a clear and understandable way to an analyst so he/she can easily filter out important suspicious behavior and what is just regular network traffic. To do this an intuitive and readable visualization of the data must be present for the expert.

Read more

Cyber Range : Comparison

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.

Read more

Cyber Range : Framework

A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is used to run network related exercises and tests.

Read more

Garner

Garner is a mobile application repository that gathers application packages from the Apple App Store and Google Play Store and extracts useful information about them. Users can use Garner's web interface to

Read more

GitLab monitoring and security

GitLab is a powerful source code management software that allows to manage the complete DevOps lifecycle: it offers code management with git, jobs and pipelines to test and deploy the code, operations monitoring and issue tracking to plan the next release.

Read more

MITRE ATT&CK® targets classifier

MITRE ATT&CK® is a knowledge base of attack tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

Read more

Monitoring 4 Security

Monitoring your servers is an important part of security. For this project you will contribute to the Monitoring 4 Security tool. This tool is composed of a web interface and a client agent that is installed on the monitored server. It has some differences compared to other monitoring solutions:

Read more

Network security using the P4 language

Programming Protocol-independent Packet Processors (P4) is a domain-specific language for network devices, specifying how data plane devices (switches, NICs, routers, filters, etc.) process packets.

Read more

Rogue wifi AP detection with Snappy

Open wifi is quite common today. The danger is that a hacker may create a fake open wifi access point (AP) to capture user traffic. A tool called Snappy allows apparently to fingerprint wifi access points, so one can easily detect roge wifi access points.

Read more

This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept