Matthias Kirstein
|
Happy Eyeballs: A Comprehensive Analysis of the Deployment and Configuration Across Various Versions and Implementations
|
BA
|
Patrick Sattler, Johannes Zirngibl, Lars Wüstrich
|
2024
|
|
Bechir Boujelbene
|
Analyzing the Characteristics of Shop Floor Networks
|
BA
|
Lars Wüstrich
|
2024
|
|
Peter Fam
|
An Analysis of the Effects of Cyber Attacks on the Network Traffic Characteristics of Shop Floor Networks
|
MA
|
Lars Wüstrich, Holger Kinkelin
|
2024
|
|
Marco Rubin
|
Exploring the viability of Large Language Models for the assessment of free text answers in an educational environment
|
MA
|
Christoph Schwarzenberg, Lars Wüstrich, Christian Lübben
|
2024
|
|
Tien Doan Viet
|
Interactive and Continuous Visualization of Traffic Causality Graphs
|
BA
|
Lars Wüstrich
|
2024
|
|
Aida Begzadic
|
Performance Optimization Strategies for Source-Accessible Web Applications
|
BA
|
Florian Wiedner, Lars Wüstrich
|
2024
|
|
Vera Wesselkamp
|
Security Aspects of the MLS Protocol beyond Building Blocks
|
MA
|
Cas Cremers, Lars Wüstrich
|
2024
|
|
Benjamin Schaible
|
Ensuring the Integrity of Submissions in Digital eLearning Platforms
|
BA
|
Florian Wiedner, Lars Wüstrich
|
2024
|
|
Robin Wölfel
|
Correction Workflow Optimizations for Practical Network Courses
|
BA
|
Florian Wiedner, Lars Wüstrich
|
2024
|
|
Stefan Genchev
|
Trustworthy Remote Signing
|
MA
|
Lars Wüstrich
|
2023
|
|
Jessica Jivanjee
|
Local AI-based Network Anomaly Detection
|
BA
|
Christian Lübben, Holger Kinkelin, Lars Wüstrich
|
2023
|
|
Uros Maletic
|
Evaluating the Impact of Data Pre-Processing to Improve Data Privacy on Machine Learning
|
BA
|
Lars Wüstrich, Holger Kinkelin
|
2023
|
|
Simon Wessling
|
Development And Application of a Hybrid Security Assessment Methodology For Source-Accessible Web Applications
|
MA
|
Lars Wüstrich, Florian Wiedner
|
2023
|
|
Mika Mampe
|
eID User Guidance for Service Providers
|
BA
|
Lars Wüstrich, Stefan Genchev
|
2023
|
|
Lilo Walter
|
Collaborative Experiment Result Collection in Hardware-Based Lab Courses
|
IDP
|
Lars Wüstrich, Florian Wiedner
|
2023
|
|
Julian Gassner
|
Performance Monitoring for the iLab-Labsystem
|
BA
|
Lars Wüstrich, Florian Wiedner
|
2023
|
|
Florian Hoppe
|
Partially Automated Plagiarism Detection for University Courses with Continuous Free Text Tasks
|
BA
|
Lars Wüstrich, Florian Wiedner, Christoph Schwarzenberg
|
2023
|
|
Tobias Wothge
|
Egress Node Behavior in iCloud Private Relay
|
IDP
|
Patrick Sattler, Johannes Zirngibl, Lars Wüstrich, Lion Steger
|
2023
|
|
Timm Bauer
|
User Guidance for Remote Qualified Electronic Signatures
|
BA
|
Lars Wüstrich
|
2023
|
|
Roland Reif
|
Developing a Methodology for Reproducible and Comparable Penetration Testing
|
MA
|
Lars Wüstrich
|
2023
|
|
Maximilian Eder
|
Analyzing eLearning statistics to improve digital teaching methods
|
MA
|
Christoph Schwarzenberg, Christian Lübben, Florian Wiedner, Lars Wüstrich
|
2022
|
|
Lorenz Nickel
|
Validation of Physical Properties in Networked Systems via Acoustic Side-Channels
|
BA
|
Lars Wüstrich, Stephan Günther
|
2022
|
|
Markus Schacherbauer
|
Designing a Database-Structure for Hardware-Based Lab Courses
|
IDP
|
Lars Wüstrich, Florian Wiedner, Christoph Schwarzenberg
|
2022
|
|
Lorenz Lehle
|
Implementation of an Interactive Import and Export Tool for Hardware-Based Lab Courses
|
IDP
|
Lars Wüstrich, Florian Wiedner
|
2022
|
|
Anna Wimbauer
|
Role Based Qualified Electronic Signatures
|
IDP
|
Lars Wüstrich, Filip Rezabek
|
2022
|
|
Markus Schacherbauer
|
Profiling Applications via their Network Flows
|
MA
|
Lars Wüstrich, Sebastian Gallenmüller
|
2022
|
|
Tin Raic
|
Threshold Cryptography enabled QES
|
MA
|
Filip Rezabek, Lars Wüstrich
|
2022
|
|
Elias Nechwatal
|
Online Traffic Causality Graphs
|
BA
|
Kilian Holzinger, Lars Wüstrich
|
2022
|
|
Jan Oesterle
|
Survey on AI-based Methods for Network Anomaly Detection
|
BA
|
Christian Lübben, Dr. Holger Kinkelin, Lars Wüstrich
|
2021
|
|
Markus Budeus
|
Mapping Network Flows to Applications for Profile Creation
|
BA
|
Lars Wüstrich, Sebastian Gallenmüller
|
2021
|
|
Nadja Schricker
|
Creating Traffic Causality Graphs from Network Captures and Application Logic
|
MA
|
Lars Wüstrich, Christian Lübben, Holger Kinkelin, Marc-Oliver Pahl
|
2021
|
|
Stefan Genchev
|
Online Identification Using the German eID Scheme - Practical Analysis Based on a Certificate Issuance Use Case
|
BA
|
Lars Wüstrich, Holger Kinkelin
|
2021
|
|
Janik Nier
|
Analysis and Comparison of Attack Sequences
|
BA
|
Lars Wüstrich, Christian Lübben
|
2021
|
|
Achref Aloui
|
Traffic Causality Graphs for Industrial Networks
|
BA
|
Lars Wüstrich, Christian Lübben, Holger Kinkelin
|
2021
|
|
Florian Wachter
|
Explainable AI for Anomaly Detection
|
MA
|
Christian Lübben, Lars Wüstrich, Holger Kinkelin
|
2021
|
|
Rafi Al Attrach
|
Similarity Detection for Free-Text Input
|
BA
|
Lars Wüstrich, Florian Wiedner
|
2021
|
|
Stefan Janker
|
Similarity Detection for Databases
|
BA
|
Lars Wüstrich, Florian Wiedner
|
2021
|
|
Lorenz Lehle
|
Efficient Processing of Large Network Captures
|
BA
|
Lars Wüstrich, Johannes Zirngibl, Christian Lübben
|
2021
|
|
Dominik Freiherr von Künßberg
|
Mapping Network Flows to Local Processes Efficiently
|
BA
|
Lars Wüstrich, Sebastian Gallenmüller
|
2021
|
|
Krutav Shah
|
Enhancing NIDS with End-Host Information
|
MA
|
Lars Wüstrich, Sebastian Gallenmüller
|
2021
|
|
Tobias Wothge
|
Industrial Control Systems (ICS) Protocol Detection
|
BA
|
Patrick Sattler, Lars Wüstrich, Johannes Zirngibl
|
2021
|
|
Stefan Schrott
|
Anonymization of Network Captures
|
BA
|
Lars Wüstrich, Filip Rezabek
|
2021
|
|
Pooja Parasuraman
|
Hardware-Supported Packet Monitoring on a Single Host
|
IDP
|
Lars Wüstrich, Sebastian Gallenmüller
|
2021
|
|
Justus Fries
|
Graph-based Analysis of Server TLS Parameters
|
IDP
|
Markus Sosnowski, Patrick Sattler, Lars Wüstrich
|
2020
|
|
Hande Akin
|
Self-Learning Models for Anomaly Detection in Smart Spaces
|
MA
|
Christian Lübben, Lars Wüstrich, Marc-Oliver Pahl
|
2020
|
|
Oliver Scheit
|
Enabling Collaborative Labsystem Workflow
|
BA
|
Lars Wüstrich, Marc-Oliver Pahl
|
2020
|
|
Muhammed Sahin
|
Analysis of Servers use of TLS Parameters
|
IDP
|
Patrick Sattler, Markus Sosnowski, Lars Wüstrich, Max Helm
|
2020
|
|
Umur Mert
|
Modeling the IIoT Inter-dependencies in Smart Factories
|
MA
|
Lars Wüstrich, Marc-Oliver Pahl
|
2020
|
|
Michael Stehling
|
Rechtliche Rahmenbedingungen für das Internet der Dinge am Beispiel der Technologie LoRaWAN (Abschlussarbeit)
|
BA
|
Marc-Oliver Pahl, Lars Wüstrich
|
2020
|
|
Lukas Schröder
|
Fingerprinting IoT Devices via Their Physical Properties
|
BA
|
Lars Wüstrich, Marc-Oliver Pahl
|
2020
|
|
Mohammed Said Derbel
|
AI-based anomaly classification
|
BA
|
Christian Lübben, Lars Wüstrich, Dr. Holger Kinkelin
|
2020
|
|
Leon Imhof
|
Secure BLE beacons with additional data
|
BA
|
Lars Wüstrich
|
2019
|
|
Daniel Meint
|
Reliable Caching for the Internet of Things
|
BA
|
Stefan Liebald, Lars Wüstrich, Marc-Oliver Pahl
|
2019
|
|
Alessandro Piccoli
|
Secure Group Key Update in IoT
|
MA
|
Lars Wüstrich, Marc-Oliver Pahl
|
2019
|
|