The Service-centric Networking group offers bachelor and master theses in five different subject areas:
Please note!
If you are interested in a subject area, please contact our team assistants Andrea Hahn or Sandra Wild (info@snet.tu-berlin.de) and attach your CV, an grades overview and include some basic background information such as your degree program, main areas of study, and most importantly: two or three sentences about what general topic/ direction you would be interested. Our team assistants will put you in touch with matching SNET group members (topic coordinators) which you can then meet in order to discuss open topics in detail.
Name | First Name | Bachelor - Masterarbeit | Title | Supervisor |
Appendino | Benjamin | MA | On-device Mobile Application Traffic Monitoring for iOS | Sanjeet Raj Pandey |
Eichenhofer | Jonathan | MA | Evaluating Monoliths and Microservices for migration to Serverless Architecture | Sanjeet Raj Pandey |
Fisch | Maximilian | BA | A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process Mining | Wolf Rieder |
Guo | Hongming | MA | Performance evaluation of trusted communication on QUIC and HTTP/3 protocol | Sanjeet Raj Pandey |
Kahlert | Alwin | BA | Enabling Trusted Identifiers for Internet of Things | Aljoscha Schulte |
Knothe | Adam | BA | A sensor and Wi-Fi based approach for indoor localization on smartphones | Christian René Sechting |
Leonkov | Alex | BA | Privacy-Preserving Telemetry for Crowdsourced Network Traffic Monitoring Applications | Tom Cory |
Mohona | Tanzira | MA | DIDComm V2 Implementation: A Pathway for Robust Off-chain Applications | Patrick Herbke |
Natusch | Dennis | MA | Authentication in mTLS with Decentralized Identifiers and Verifiable Credentials | Sandro Rodriguez Garzon |
Peppas | Dimitrios | MA | Enhancing Resource Modeling and Management in Hybrid Environments through edge-to-cloud simulation | Hai Dinh Tuan |
Ruban | Anna | BA | DIDComm V2 Implementation: A Pathway for Robust Off-chain Applications | Tom Cory |
Seita | Daria | MA | A QUIC Look at Mobile Privacy | Tom Cory |
Zdanowski | Patrick | BA | Development of an interactive digital campus map with navigation functionality for mobile devices | Christian René Sechting |
Name | First Name | Bachelor - Masterarbeit | Title | Supervisor |
Fu | Jianeng | MA | Secure messaging agent for 5G Core communication | Hai Dinh Tuan |
Gharibnejad | Erfan | BA | Securing V2X communication and providing authenticity with DIDs and VCs | Artur Philipp |
Heitkamp | Kristina | BA | On-device Modification of Mobile Application Security Configurations | Tom Cory |
Huynh | Thu-My | MA | Design and Implementation of an Interactive Visualization Tool to Increase Transparency of Web Tracking | Philip Raschke |
Jeong | Soo Min | MA | Matching Online and Offline Users for Hybrid Evaluation of Recommender Algorithms | Tobias Eichinger |
Kahlert | Alwin | BA | Enabling Trusted Identifiers for Internet of Things | Aljoscha Schulte |
Kelbel | Vincent | MA | Integration of SSI into the Blade IDM to Enable DIDComm-based Communication in Blade | Sebastian Göndör |
Kengne Tene | Armand Borel | BA | Integration of Optimization Algorithms for Time Management of Course Preparations in Higher Education | Patrick Herbke |
Lösche | Simon Luca | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Mlaouhi | Alaa | BA | Comparison of state management solutions for serverless computing | Maria Mora Martinez |
Orjuela Pico | Brayan Steven | MA | Decentralized Revocation of Verifiable Credentials | Patrick Herbke |
Pevzner | Sarah Moriel | BA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Sebastian Göndör |
Pfoch | Linus | MA | Derivation of BPMN-based process models from SAP-based product structure data | Kai Grunert |
Pham | Kevin Hai Nam | BA | Secure Web of Things Discovery with DIDs and VCs | Artur Philipp |
Reich | Moritz | MA | A Plugin System for a Software as a Service Application based on the Example of PROCEED | Kai Grunert |
Rieder | Wolf | MA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Philip Raschke |
Rohmann | Leon | BA | Towards a Modular Privacy Score Framework for Mobile Applications | Tom Cory |
Rüger | Tom | MA | Realizing Polyglot Software Modules in Decentralized and Extensible Service Architectures | Sebastian Göndör |
Schmolenski | Niklas | BA | Detecting latent confounders in purely observational data | Boris Lorbeer |
Sharma | Ankush | MA | Location-aware Serverless Function Placement Approach in an Edge Environment | Maria Mora Martinez |
Shawarba | Naseem | BA | Location-aware Serverless Function Placement Approach in an Edge Environment | Tobias Eichinger |
Sindermann | Jean-Pascal | Ba | SSI Profile: Using DIDs and VCs for W3C Web of Things (WoT) Thing Description authenticity | Artur Philipp |
Six | Florian | BA | Adaptive Service Placement based on application level information | Hai Dinh Tuan |
Stender | Nick Jörn | MA | Verifiable Credentials for Network Access Control | Artur Philipp |
Westlinning | Steffen | MA | Optimizing Cold Start Latency in Serverless using Function Discovery | Sanjeet Raj Pandey |
Wilhelm | Mai Khanh Isabelle | MA | Creation of a Middleware for Multi-Vendor Communication with Mobile Robots | Kai Grunert |
Wittig | Luisa | BA | Performance Analysis of Process Diagrams within the PROCEED Business Process Management System | Kai Grunert |
Zountsas | Georgios | BA | A platform for automated summaries generation for medical articles | Aikaterini Katsarou |
The graduate seminar is a forum for scientific discussions. Students have the possibility to discuss their theses amongst fellow students, graduates and the professor of SNET. In the early phase of their work, their thesis approach is discussed, while at the end the results are presented. Students who are currently working on their thesis at our chair are required to attend each of the meetings, especially if other related topics are being presented. We are also looking forward to welcoming other students who are interested in the seminar or are about to write a thesis at our chair.
Additional Information
Students who decide to write a thesis at our chair are required to talk about their topic and the approach they are going to follow in an initial presentation in the early phase of their thesis time. This presentation should take 10 minutes with 5 minutes of questions and answers afterwards.
After finishing their thesis, students have to defend it by giving a talk, in which they demonstrate the results achieved in the thesis. Bachelor students should talk 15 minutes with 5 minutes of questions and answers, whereas Master students are required to present 20 minutes and discuss it afterwards for 10 minutes.
Title | Presentation | Students | Time | Supervisor |
Privacy-Preserving Telemetry for Crowdsourced Network Traffic Monitoring Applications | Bachelor Defense | Alex Leonkov | 14.15 | Tom Cory |
Using Graph Neural Networks for Web Tracker Detection | Bachelor Initial | Kai Stross | 14.45 | Wolf Rieder |
Empowering Off-Chain Applications through the Implementation of DIDComm V2 | Bachelor Initial | Tanzira Mohana | 15.05 | Patrick Herbke |
Time Series Analysis in Process Mining | Bachelor Initial | Lukas Rohana | 15.25 | Wolf Rieder |
RPA with LLMs | Bachelor Initial | Nick Reiter | 15.45 | Wolf Rieder |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Plugin Architecture on the Example of PROCEED | Master Defense | Moritz Reich | 14.15 | Kai Grunert |
A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process Mining | Bachelor Defense | Maximilian Oliver Fisch | 14.55 | Wolf Rieder |
Deployment Strategies in the Cloud-Edge Continuum: Is Unikernel Container 2.0? | Master Initial | Luis Borges | 15.25 | Hai Dinh Tuan |
Towards a Modular Privacy Score Framework for Mobile Applications | Bachelor Defense | Leon Rohmann | 15.45 | Tom Cory |
Comparing stated and observed Privacy Practices of Mobile Applications | Bachelor Defense | Anna Ruban | 16.15 | Wolf Rieder |
Integration of Optimization Algorithms for Time Management of Course Preparations in Higher Education | Bachelor Defense | Armand Borel Kengne Tene | 16.45 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Verifiable Credentials for Network Access Control | Master Defense | Nick Jörn Stender | 14.15 | Artur Philipp |
Forensic Checkpointing for microservice portability | Master Initial | Jialun Jiang | 14.55 | Hai Dinh Tuan |
Beyond Traditional Algorithms: How Large Language Models are Transforming Process Discovery in Process Mining | Master Initial | Heyi Li | 15.15 | Wolf Rieder |
Token flow analysis for process mining on blockchain data | Master Initial | Tom Funke | 15.35 | Richard Hobeck |
This section covers general topics and frequently asked questions about the organizational process of bachelor, master and diploma theses at our department. Please read this page carefully before contacting one of the supervisors so that you are well prepared when you express your interest and discuss the topics with the supervisors.
Workflow
The organizational workflow of a bachelor's, master's or diploma thesis at SNET is described below:
Please note that it must be submitted at least 6 weeks before the end of the semester to ensure that you receive your grade in the same semester. Therefore, you must register your thesis with the Examination Office at least 4 months + 6 weeks for Bachelor's theses and 6 months + 6 weeks for Master's theses prior to submission.
Also when preparing a thesis, please observe the following instructions: