Are you looking for a master thesis or an internship? Here are some ideas...
AMC, for Auto Multiple Choice, is an open source software that allows a teacher to create multiple-choice tests in a very simple way. But, the most interesting part of AMC, is the ability to automatically correct the tests of all students.
Intrusion and Advanced Persistent Threat detection systems analyze daily enormous amounts of data. The evidences produced by such systems need to be presented in a clear and understandable way to an analyst so he/she can easily filter out important suspicious behavior and what is just regular network traffic. To do this an intuitive and readable visualization of the data must be present for the expert.
A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is usually to run network related exercises and tests.
A Cyber Range is a system that allows to simulate networks and scenarios involving a lot of devices and participants. It is used to run network related exercises and tests.
Garner is a mobile application repository that gathers application packages from the Apple App Store and Google Play Store and extracts useful information about them. Users can use Garner's web interface to
GitLab is a powerful source code management software that allows to manage the complete DevOps lifecycle: it offers code management with git, jobs and pipelines to test and deploy the code, operations monitoring and issue tracking to plan the next release.
MITRE ATT&CK® is a knowledge base of attack tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
Modern mobile devices produce a lot of network traffic, that can be hard to completely capture because of the multiple communication technologies used (Bluetooth, cellular network, wifi etc.)
Monitoring your servers is an important part of security. For this project you will contribute to the Monitoring 4 Security tool. This tool is composed of a web interface and a client agent that is installed on the monitored server. It has some differences compared to other monitoring solutions:
Programming Protocol-independent Packet Processors (P4) is a domain-specific language for network devices, specifying how data plane devices (switches, NICs, routers, filters, etc.) process packets.
Open wifi is quite common today. The danger is that a hacker may create a fake open wifi access point (AP) to capture user traffic. A tool called Snappy allows apparently to fingerprint wifi access points, so one can easily detect roge wifi access points.
Transport Layer Security (TLS) is building block for the security of communications over the Internet. TLS is used for securing http(s), DNS (DNS-over-TLS and DNS-over-HTTPS), emails and many more!