The Service-centric Networking group offers bachelor and master theses in five different subject areas:
Please note!
If you are interested in a subject area, please contact our team assistants Andrea Hahn or Sandra Wild (info@snet.tu-berlin.de) and attach your CV, an grades overview and include some basic background information such as your degree program, main areas of study, and most importantly: two or three sentences about what general topic/ direction you would be interested. Our team assistants will put you in touch with matching SNET group members (topic coordinators) which you can then meet in order to discuss open topics in detail.
Name | First Name | Bachelor - Masterarbeit | Title | Supervisor |
Fu | Jianeng | MA | Secure messaging agent for 5G Core communication | Hai Dinh Tuan |
Fuhrmann | Oliver | BA | Persistence Layer for a Cloud Application on the Example of PROCEED | Kai Grunert |
Gharibnejad | Erfan | BA | Securing V2X communication and providing authenticity with DIDs and VCs | Artur Philipp |
Heitkamp | Kristina | BA | On-device Modification of Mobile Application Security Configurations | Tom Cory |
Huynh | Thu-My | MA | Design and Implementation of an Interactive Visualization Tool to Increase Transparency of Web Tracking | Philip Raschke |
Jeong | Soo Min | MA | Matching Online and Offline Users for Hybrid Evaluation of Recommender Algorithms | Tobias Eichinger |
Kahlert | Alwin | BA | Enabling Trusted Identifiers for Internet of Things | Aljoscha Schulte |
Kelbel | Vincent | MA | Integration of SSI into the Blade IDM to Enable DIDComm-based Communication in Blade | Sebastian Göndör |
Kengne Tene | Armand Borel | BA | Integration of Optimization Algorithms for Time Management of Course Preparations in Higher Education | Patrick Herbke |
Lösche | Simon Luca | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Mlaouhi | Alaa | BA | Comparison of state management solutions for serverless computing | Maria Mora Martinez |
Orjuela Pico | Brayan Steven | MA | Decentralized Revocation of Verifiable Credentials | Patrick Herbke |
Pevzner | Sarah Moriel | BA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Sebastian Göndör |
Pfoch | Linus | MA | Derivation of BPMN-based process models from SAP-based product structure data | Kai Grunert |
Reich | Moritz | MA | A Plugin System for a Software as a Service Application based on the Example of PROCEED | Kai Grunert |
Rieder | Wolf | MA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Philip Raschke |
Rüger | Tom | MA | Realizing Polyglot Software Modules in Decentralized and Extensible Service Architectures | Sebastian Göndör |
Schmolenski | Niklas | BA | Detecting latent confounders in purely observational data | Boris Lorbeer |
Sharma | Ankush | MA | Location-aware Serverless Function Placement Approach in an Edge Environment | Maria Mora Martinez |
Shawarba | Naseem | BA | Location-aware Serverless Function Placement Approach in an Edge Environment | Tobias Eichinger |
Six | Florian | BA | Adaptive Service Placement based on application level information | Hai Dinh Tuan |
Westlinning | Steffen | MA | Optimizing Cold Start Latency in Serverless using Function Discovery | Sanjeet Raj Pandey |
Wilhelm | Mai Khanh Isabelle | MA | Creation of a Middleware for Multi-Vendor Communication with Mobile Robots | Kai Grunert |
Wittig | Luisa | BA | Performance Analysis of Process Diagrams within the PROCEED Business Process Management System | Kai Grunert |
Zountsas | Georgios | BA | A platform for automated summaries generation for medical articles | Aikaterini Katsarou |
Name | First Name | Bachelor - Master Thesis | Title | Supervisor |
Abdelkhalek | Yousef | MA | Incorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained Environments | Aljoscha Schulte |
Akimov | Grigori | MA | Detecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency Exchanges | Friedhelm Victor |
Alissa | Fadel | BA | Cross-Browser Comparison of Web Tracker Activity Using T.EX | Philip Raschke |
Barkemeyer | David | BA | Implementing an NDNCERT Challenge based on Verifiable Credentials | Aljoscha Schulte |
Barman | Kaustabh | MA | Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Patrick Herbke |
Baumann | Florian | BA | A Coarse Location-Service for Collaborating with Approximately Nearest Neighbors | Tobias Eichinger |
Chada | Wepan | MA | Understanding Adherence to Ecological Momentary Assessments in the Example of the TYDR App | Aikaterini Katsarou |
Colak | Cihad | BA | ML-based Tracker Detection in Android Applications | Tom Cory |
Dhakal | Uttam | MA | Abstractive text summarization of scientific articles from Bio - medical domain | Aikaterini Katsarou |
Dungs | Imke | BA | Creation of BPMN Processes with a Smart Voice Assistant | Kai Grunert |
Douss | Nabil | MA | Multi-domain Sentiment Analysis with an Active learning Mechanism | Aikaterini Katsarou |
Frech | Berit | MA | MOBIDID - Decentralized Mobile Messaging using DIDComm | Hakan Yildiz |
George | Lukas | BA | STARK-based Chain Relays | Martin Westerkamp |
Hibatullah | Rayhan Naufal | BA | State management in 5G using Akka Serverless | Maria Mora Martinez |
Hofmann | Pascal | BA | Analysis and Implementation of Secure Key Management in Mobile Wallet Applications | Sebastian Göndör |
Hrustic | Amira | BA | Analysing Web Tracking in Mobile Android HTTP Traffic | Tom Cory |
Isaias Sanchez Figueroa | Adrian | BA | Integrating DIDComm Messaging in ActivityPub-based Social Networks | Sebastian Göndör |
Jie | Anna | MA | An Intelligent Decision Support System for Test Optimization Purposes | Aikaterini Katsarou |
Joderi-Shoferi | Janis | BA | Adaptive Processes in a decentralized Business Process Management System | Kai Grunert |
Kalz | Andrea | MA | Synergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking Project | Aljoscha Schulte |
Keller | Laura | BA | Analysing the Effect of Android Permissions on Mobile Tracking | Tom Cory |
Krause | Jonas | BA | Graph Analysis of Revocation Registries in Hyperledger Indy | Patrick Herbke |
Kmit | Anastasiya | BA | Machine Learning-supported Analysis of Mobile Application Traffic | Tom Cory |
Ksoll | Maximilian | MA | Challenges of implementing microservices as serverless functions | Maria Mora Martinez |
Kutal | Volkan | BA | Mobile Traffic Data Visualization for Web Tracker Detection | Tom Cory, Philip Raschke |
Lamichane | Ananta | MA | A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Tobias Eichinger |
Liu | Liming | MA | Coordinated Resolution of Compute Request in the Compute-centric Networks | Hai Dinh Tuan |
Lösche | Jonas | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Lukyanovich | Nastassia | BA | Visualising Mobile Web Traffic Characteristics with an Interactive Dashboard | Tom Cory |
Matini | Shirkouh | MA | Cryptocurrency volatility prediction using sentiment analysis from social media | Aikaterini Katsarou |
Mohsen | Mustafa Ismail | BA | Comparative study of causal discovery methods | Boris Lorbeer |
Nawaz | Hafiz Umar | MA | State persistance evaluation for the stateful serverless platforms | Maria Mora Martinez |
Odorfer | Roland | MA | Decentralized Identity Management and its Application in Future Cellular Networks | Sandro Rodriguez Garzon |
Oppermann | Laura | MA | Concept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based Marketplaces | Sebastian Göndör |
Rau | Jonathan | MA | Distributed Ledgers as Shared Audit Trails for Carbon Removal | Marcel Müller, Robin Clemens |
Rhimi | Radhouane | BA | Platform for crowdsourcing hate speech | Aikaterini Katsarou |
Rucaj | Denisa | MA | Feature-based Extractive Multi-document Summarisation | Bianca Lüders, Aikaterini Katsarou |
Saadi | Juba | MA | Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Sebastian Göndör |
Schulenberg | Emilia | BA | Design and Implementation of a Cloud Wallet for Self-hosted Decentralized Services | Sebastian Göndör |
Schwerdtner | Henry | BA | Identifying Structural Web Tracker Characteristics With Real-Time Graph Analysis | Philip Raschke |
Sivirina | Anastasiia | MA | Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Hakan Yildiz |
Skodzik | Melanie | MA | Analyzing Market Manipulation on Automated Market Maker based Decentralized Cryptocurrency Exchanges | Friedhelm Victor |
Song | Yong Huyn | BA | A Comparison of Web Tracking and its Mobile Counterpart | Tom Cory |
Tsaplina | Olesia | BA | Datenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten Datenschutzmanagement | Philip Raschek, Sebastian Göndör |
Urban | Tobias | BA | Analyse der Evolution von Featuresets sozialer Netzwerkplattformen | Sebastian Göndör |
Wang | Mingzhi | MA | MATSim-based Data Diffusion Models for Dissemination-based Collaborative Filtering | Tobias Eichinger |
Name | First Name | Bachelor - Master Thesis | Title | Supervisor |
Akimov | Grigori | MA | Detecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency Exchanges | Friedhelm Victor |
Ebermann | Marcel | BA | On the Accuracy of Block Timestamp-based Time-sensitive Smart Contracts on Private Permissioned Ethereum Blockchains | Tobias Eichinger |
Fan | Yuanzhang | MA | Optimizing content dissemination in federated online social networks | Sebastian Göndör |
Herbke | Patrick | MA | Detection of Web Tracker Characteristics with Graph Analysis Methods | Philp Raschke |
Hertwig | Kevin | BA | Development of an Identity and Access Management for a decentralized Business Process Management System | Kai Grunert |
Hrustic | Amira | BA | Analysing Web Tracking in Mobile Android HTTP Traffic | Thomas Cory |
Jeney | Roxana | MA | Multi-Domain Sentiment Classification using an LSTM-based Framework with Attention Mechanism | Aikaterini Katsarou |
Kutal | Volkan | BA | Mobile Traffic Data Visualization for Web Tracker Detection | Tom Cory, Philip Raschke |
Lang | Carolin Sophie | BA | Mapping Company Information to Web Domains for Enhanced User Transparency | Philip Raschke |
Li | Ziyang | BA | Best Practices for using JavaScript on Resource-Constrained Microcontrollers -> geändert: Memory Consumption Analysis for JavaScript Engines on Microcontrollers | Kai Grunert |
Mohamed | Gehad Gamal Salem Awad | BA | Intercepting and Monitoring TLS Traffic in Mobile Applications | Thomas Cory |
Nawaz | Hafiz Umar | MA | State persistance evaluation for the stateful serverless platforms | Maria Mora - Martinez |
Pandey | Sanjeet Raj | MA | Smart function placement for serverless applications | Maria Mora - Martinez |
Pelz | Konstantin | BA | A Context-aware Mobile App to Compute Location- and Air Pollution-based Emission Compensations for Car Rides | Sandro Rodriguez Garzon |
Peppas | Dimitrios | BA | Design and Implementation of a Mobile Sensing App for Experience Sampling | Felix Beierle |
Rieder | Wolf Siegfried | BA | On The Usefulness of HTTP Responses to Identify Differences Between Non- And Web Trackers | Philip Raschke |
Rucaj | Denisa | MA | Feature-based Extractive Multi-document Summarisation | Bianca Lüders, Katerina Katsarou |
Ryu | Youngrak | MA | Data storage in DHTs: A Framework for storing larger data in Kademlia | Martin Westerkamp, Dirk Thatmann |
Sarder | Uma | MA | Design and Implementation of Control Flow and Permission Management for Polyglot Distributed Service Modules in the Blade Ecosystem | Sebastian Göndör |
Schneider | Maximilian | BA | A Web Service to Enable the Computation of Dynamic Air Pollution-aware Road User Charges on Mobile Devices | Sandro Rodriguez Garzon |
Stumpf | Julien | BA | Using Ad Blocking Filter Lists for Automated Labeling of Web Tracker Traffic | Philip Raschke |
Syed Qasim | Hussain | MA | Blockchain-based Trusted Execution Environments for Privacy-preserving Medical Research | Marcel Müller |
Yang | Huaning | BA | How Representative Is Measured Network Traffic: Individual Browsing Behavior And Its Technical Manifestation | Philip Raschke |
The graduate seminar is a forum for scientific discussions. Students have the possibility to discuss their theses amongst fellow students, graduates and the professor of SNET. In the early phase of their work, their thesis approach is discussed, while at the end the results are presented. Students who are currently working on their thesis at our chair are required to attend each of the meetings, especially if other related topics are being presented. We are also looking forward to welcoming other students who are interested in the seminar or are about to write a thesis at our chair.
Additional Information
Students who decide to write a thesis at our chair are required to talk about their topic and the approach they are going to follow in an initial presentation in the early phase of their thesis time. This presentation should take 10 minutes with 5 minutes of questions and answers afterwards.
After finishing their thesis, students have to defend it by giving a talk, in which they demonstrate the results achieved in the thesis. Bachelor students should talk 15 minutes with 5 minutes of questions and answers, whereas Master students are required to present 20 minutes and discuss it afterwards for 10 minutes.
Title | Presentation | Students | Time | Supervisor |
Securing V2X communication and providing authenticity with DIDs and VCs | Bachelor Defense | Erfan Gharibnejad | 14.15 | Artur Philipp |
Optimizing Cold Start Latency in Serverless using Function Discovery | Master Defense | Steffen Westlinning | 14.45 | Sanjeet Raj Pandey |
DIDComm over QUIC and HTTP/3: An Evaluation | Bachelor Initial | Hong Ming Guo | 15.25 | Sanjeet Raj Pandey |
Derivation of BPMN-based process models from SAP-based product structure data | Master Defense | Linus Pfoch | 15.45 | Kai Grunert |
Increasing Transparency Through Automated Web Tracking Detection | Bachelor Initial | Thu My Huyn | 16.25 | Philip Raschke |
A QUIC look at mobile privacy | Master Initial | Daria Seita | 16.45 | Tom Cory |
Title | Presentation | Students | Time | Supervisor |
Detecting latent confounders in purely observational data | Bachelor Defense | Niklas Schmolenski | 14.15 | Boris Lorbeer |
Authentication with DIDs and VCs in mTLS | Master Initial | Dennis Natusch | 14.45 | Sandro Rodriguez Garzon |
Forensic Checkpointing for Microservice Portability | Master Initial | Jialun Jiang | 15.05 | Hai Dinh Tuan |
Separated Company Environment in Cloud Applications on the example of PROCEED | Bachelor Initial | Felipe Trost | 15.25 | Kai Grunert |
Realizing Polyglot Software Modules in Decentralized and Extensible Service | Master Defense | Tom Rüger | 15.45 | Sanjeet Raj Pandey |
Title | Presentation | Students | Time | Supervisor |
A sensor and Wi-Fi based approach for indoor localization on smartphones | Bachelor Initial | Adam Knothe | 14.15 | Christian René Sechting |
Development of an interactive digital campus map with navigation functionality for mobile devices | Bachelor Initial | Patrick Zdanowski | 14.35 | Christian René Sechting |
Real-time Web Tracker Detection | Master Defense | Henry Schwerdtner | 14.55 | Philip Raschke |
Monolithic to Serverless Transformation | Master Initial | Jonathan Eichenhofer | 15.35 | Sanjeet Raj Pandey |
Calculating of Process Properties | Bachelor Defense | Luisa Wittig | 15:55 | Kai Grunert |
Extending iFogSim2 for Serverless | Master Inital | Dimitrios Peppas | 16.25 | Hai Ding Tuan |
Title | Presentation | Students | Time | Supervisor |
Adaptive services placement based on application-level information | Bachelor Defense | Florian Six | 14.15 | Hai Dinh Tuan |
Privacy-Preserving Telemetry for Heimdall | Bachelor Initial | Alex Leonkov | 14.45 | Tom Cory |
Leveraging DIDComm V2 for Enhanced Off-chain Applications Utilization | Master Initial | Tanzira Ulfat Mohana | 15.05 | Patrick Herbke |
Location-aware Serverless Function Placement Approach in an Edge Environment | Master Defense | Ankush Sharma | 15.25 | Maria Mora Martinez |
Title | Presentation | Students | Time | Supervisor |
Extending iFogSim2 for Serverless | Master Initial | Dimitrios Peppas | 14.15 | Hai Dinh Tuan |
A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process Mining | Bachelor Initial | Maximilian Oliver Fisch | 14.35 | Patrick Herbke |
Forensic Checkpointing for microservice portability | Master Initial | Jialun Jiang | 14.55 | Hai Dinh Tuan |
Privacy Policies vs Reality | Bachelor Initial | Anna Ruban | 15.15 | Tom Cory |
Title | Presentation | Students | Time | Supervisor |
Secure Web of Things Discovery with DIDs and VCs | Bachelor Initial | Kevin Hai Nam Pham | 14:15 | Artur Philipp |
Creation of a middleware for multi-vendor communication with mobile robots | Master Defense | Isabelle Wilhelm | 14:35 | Kai Grunert |
On-device Mobile Application Traffic Monitoring on iOS | Master Initial | Benjamin Appendino | 15:15 | Tom Cory |
Verifiable Credentials for Network Access Control | Master Initial | Nick Stender | 15:35 | Artur Philipp |
Policy Development for Kademlia-based Revocation of Verifiable Credentials | Bachelor Initial | Philip Brozicevic | 15:55 | Patrick Herbke |
DIDComm v2 client for 5G Core networks | Master Defense | Jianeng Fu | 16:15 | Hai Dinh Tuan |
Title | Presentation | Students | Time | Supervisor |
Plugin Architecture on the Example of PROCEED | Master Initial | Moritz Reich | 14.15 | Kai Grunert |
SSI Profile: Using SSI for W3C Web of Things (WoT) Thing Description authenticity | Bachelor Initial | Jean-Pascal Sindermann | 14.35 | Artur Philipp |
A platform for automated summaries generation for medical articles | Bachelor Defense | Georgios Zountsas | 14.55 | Aikaterini Katsarou |
Leveraging NDN trust in IoT | Bachelor Initial | Alwin Kahlert | 15.35 | Aljoscha Schulte |
DIDComm v2 client for 5G Core networks | Master Defense | Jianeng Fu | 15.55 | Hai Dinh Tuan |
Securing V2X communication and providing authenticity with DIDs and VCs | Bachelor Initial | Erfan Gharibnejad | 16.35 | Artur Philipp |
Title | Presentation | Students | Time | Supervisor |
Blade as DIDComm Mediator | Bachelor Defense | Moriel Pevzner | 14.15 | Sebastian Göndör |
DIDComm SSI VDR | Master Defense | Vincent Kelbel | 14.45 | Sebastian Göndör |
Evaluation and Implementation of a Persistence Layer for a Cloud Application | Bachelor Initial | Oliver Fuhrmann | 15.25 | Kai Grunert |
Dynamic AGV Allocation in PROCEED | Master Defense | Isabelle Wilhelm | 15.45 | Kai Grunert |
Detecting latent confounders in purely observational data | Bachelor Initial | Niklas Schmolenski | 16.25 | Boris Lorbeere |
Evaluation of the functionality of an open source 5G core deployed using serverless computing | Master Initial | Paula Lopez Medina | 16.45 | Hai Dinh Tuan, Maria Mora Martinez |
Title | Presentation | Students | Time | Supervisor |
Graph Analysis of Revocation Registries in Hyperledger Indy | Bachelor Defense | Jonas Krause | 14.15 | Patrick Herbke |
Cold-Starts reduction using Serverless Application Discovery | Master Initial | Steffen Westlinning | 14.45 | Sanjeet Raj Pandey |
Matching Online and Offline Users for Hybrid Evaluation of Recommender Algorithms | Master Defense | Soo Min Jeong | 15.05 | Tobias Eichinger |
On-device Modification of Mobile Application Security Configurations | Bachelor Defense | Kristina Heitkamp | 15.45 | Tom Cory |
Developing a Laboratory for Analysing Trust Mechanisms in Decentralized Networks | Master Initial | Brayan Steven Orjuela Pico | 16.15 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Challenges of implementing microservices as serverless functions | Master Defense | Maximilian Ksoll | 14.15 | Maria Mora Martinez |
Comparison of state management solutions for serverless computing | Bachelor Defense | Alaa Mlaouhii | 14.50 | Maria Mora Martinez |
Multi-faceted on-device Analysis of Android Apps | Bachelor Initial | 15.10 | Tom Cory | |
Time-series Analysis of Android HTTP Traffic | Bachelor Defense | Simon Lösche | 15.35 | Tom Cory |
Title | Presentation | Students | Time | Supervisor |
Increasing Transparency Through Automated Web Tracking Detection | Bachelor Initial | Thu My Huyn | 14.15 | Philip Raschke |
Polyglott Blade Modules | Master Initial | Tom Rüger | 14.50 | Sebastian Göndör |
Incorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained Environments | Master Defense | Yousef Abdelkhalek | 15.25 | Aljoscha Schulte |
IP - Enabling SSI Interoperability with Aries DIDComm v2 Implementation | Master Initial | Judith Högerl | 16.05 | Hakan Yildiz |
Platform for crowdsourcing hate speech | Bachelor Defense | Radhouane Rhimi | 16.40 | Katerina Katsarou |
Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Master Defense | Kaustabh Barman | 17.20 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Machine-learning Supported Analysis of Mobile Application Traffic | Bachelor Defense | Anastasiya Kmit | 14.15 | Tom Cory |
Calculating process properties | Bachelor Initial | Luisa Wittig | 14.55 | Kai Grunert |
Decentralized resource management in Kubernetes (Title TBA) | Bachelor Initial | Florian Six | 15.30 | Hai Dinh Tuan |
Serverless function placement based on distance to the user | Master Initial | Ankush Sharma | 16.05 | Maria Mora Martinez |
Analysing the Effect of Android Permissions on Mobile Tracking | Bachelor Defense | Laura Keller | 16.40 | Tom Cory |
A Policy Editor for the JSON-Serialization of Privacy Policies Written in Natural Language | Bachelor Initial | Naseem Shawarba | 17.20 | Tobias Eichinger |
Web-based Time Optimization for Lecturer | Bachelor Initial | Armand Borel Kengne Tene | 17.55 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Distributed Ledgers as Shared Audit Trails for Carbon Removal | Master Defense | Jonathan Rau | Marcel Müller | |
A comparative study of causal discovery methods | Bachelor Defense | Mustafa Ismail Mohsen | Boris Lorbeer | |
ML-based Tracker Detection in Android Applications | Bachelor Defense | Cihad Colak | Tom Cory | |
Visualising Mobile Web Traffic Characteristics with an Interactive Dashboard | Bachelor Defense | Nastassia Lukyanovich | Tom Cory | |
A Policy Editor for the Formalization of Privacy Policies Written in Natural Language | Bachelor Initial | Naseem Shawarba | Tobias Eichinger | |
A platform for automated summaries generation for medical articles | Bachelor Initial | Georgios Zountsas | Katerina Katsarou |
Title | Presentation | Students | Time | Supervisor |
Synergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking Project | Master Initial | Andreas Kalz | 14.15 | Aljoscha Schulte |
A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Master Defense | Ananta Lamichhane | 14.45 | Tobias Eichinger |
STARK-based Chain Relays | Bachelor Defense | Lukas Lee George | 15.15 | Martin Westerkamp |
Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Master Initial | Anastasiia Sivirina | 15.45 | Hakan Yildiz |
State management in 5G using Akka Serverless | Bachelor Defense | Rayhan Naufal Hibatullah | 16.15 | Maria Mora Martinez |
Title | Presentation | Students | Time | Supervisor |
Implementing a NDNCERT Challenge based on Verifiable Credentials | Bachelor Defense | David Barkemeyer | 14.15 | Aljoscha Schulte |
SSI ActivityPub for Mastodon | Bachelor Defense | Adrian Isaias Sanchez | 14.45 | Sebastian Göndör |
P2P Communication between End Users wtih DIDcomm Messaging | Master Initial | Berit Frech | 15.15 | Hakan Yildiz |
Blade as DIDComm Mediator | Bachelor Initial | Moriel Pevzner | 15.45 | Sebastian Göndör |
DIDComm Microblogging | Master Initial | Vincent Kelbel | 16.15 | Sebastian Göndör |
DIDComm v2 client for 5G Core networks | Master Initial | Jianeng Fu | 16.45 | Hai Dinh Tuan |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
A Framework for the Implementation of a SSI-based Energy Management System for the Charging of Electric Vehicles | Master Initial | Rigerta Tola | 14.15 | Patrick Herbke |
Adaptive Processes in a decentralized Business Process Management System | Bachlelor Defense | Janis Joderishoferi | 14.45 | Kai Grunert |
A MATSim-based Data Diffusion Model for Dissemination-based Collaborative Filtering | Master Defense | Mingzhi Wang | 15.15 | Tobias Eichinger |
A Comparison of Web Tracking and its Mobile Counterpart | Bachlelor Defense | Yong Hyun Song | 15.45 | Tom Cory |
DIDComm v2 client for 5G Core networks | Master Initial | Jianeng Fu | 16.15 | Hai Dinh Tuan |
Cryptocurrency volatility prediction using sentiment analysis from social media | Master Initial | Shirkouh Matini | 16.45 | Katerina Katsarou |
Title | Presentation | Students | Time | Supervisor |
Concept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based Marketplaces | Master Defense | Laura Oppermann | 14.15 | Sebastian Göndör |
Comparison of state management solutions for serverless computing | Bachelor Initial | Alaa Mlaouhi | 14.45 | Maria Mora Martinez |
Multi-domain Sentiment Analysis with an Active learning Mechanism | Master Defense | Nabil Douss | 15.15 | Aikaterini Katsarou |
On-device Modification of Mobile Application Security Policies | Bachelor Initial | Kristina Heitkamp | 15.45 | Tom Cory |
Title | Presentation | Students | Time | Supervisor |
A Matchmaking Service for Hybrid Evaluation of Recommender Algorithms | Master Initial | Soo Min Jeong | 14.15 | Tobias Eichinger |
Understanding IoT blockchains | Master Initial | Jile Sorout | 14.45 | Friedhelm Victor, René Sechting |
HTTP/S Response Classifier v2.0 | Master Initial | Wolf Rieder | 15.15 | Philip Raschke |
Platform for crowdsourcing hate speech | Bachelor Initial | Radhwen Rhimi | 15.45 | Aikaterini Katsarou |
Title | Presentation | Students | Time | Supervisor |
Graph analysis of Revocation Registries in Hyperledger Indy | Bachelor Initial | Jonas Krause | 14.15 | Patrick Herbke |
Analysis and Implementation of Secure Key Management in Mobile Wallet Applications | Bachelor Defense | Pascal Hoffmann | 14.45 | Sebastian Göndör |
Decentralized Identity Management and its Application in Future Cellular Networks | Master Defense | Roland Odorfer | 15.15 | Sandro Rodriguez Garzon |
A Coarse Location-Service for Collaborating with Approximately Nearest Neighbors | Bachelor Initial | Florian Baumann | 15.45 | Tobias Eichinger |
Implementation of an SSI-based Process for German Federal Election | Bachelor Initial | Florian Wehner | 16.15 | Patrick Herbke |
Platform for Crowdsourcing Hate Speech | Bachelor Initial | Radhwen Rhimi | 16.45 | Aikaterini Katsarou |
Title | Presentation | Students | Time | Supervisor |
Dynamic AGV Allocation in PROCEED | Master Initial | Isabelle Wilhelm | 14.15 | Kai Grunert |
Managing Higher Education Certificates in a Self-Sovereign Identity Ecosystem | Master Initial | Kaustabh Barman | 14.45 | Patrick Herbke |
Platform for crowdsourcing hate speech | Bachelor Initial | Radhwen Rhimi | 15.15 | Aikaterini Katsarou |
Analysing the Effect of Android Permissions on Mobile Tracking | Bachelor Initial | Laura Keller | 15.45 | Tom Cory |
Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Master Initial | Anastasiia Sivirina | 16.15 | Hakan Yildiz |
Title | Presentation | Students | Time | Supervisor |
Challenges of implementing microservices as serverless functions | Master Initial | Maximilian Ksoll | 14.15 | Maria Mora Martinez |
Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Master Defense | Juba Saadi | 14.45 | Sebastian Göndör |
Blade as DIDComm Mediator | Bachelor Initial | Arian Variri | 15.15 | Sebastian Göndör |
ML-based Tracker Detection in Android Applications | Bachelor Initial | Cihad Colak | 15.45 | Tom Cory |
Interconnection of SAP and dBPMS | Master Initial | Linus Pfoch | 16.15 | Kai Grunert |
Time-series Analysis of Android HTTP Traffic | Bachelor Initial | Simon Lösche | 16.45 | Tom Cory |
Title | Presentation | Students | Time | Supervisor |
tbd | Master Initial | Jonathan Rau | 14.15 | Marcel Müller, Robin Klemens |
Implementing a stateful serverless application on Akka Serverless | Bachelor Initial | Rayhan Naufal Hibatullah | 14.45 | Maria Mora Martinez |
Analyse der Evolution von Featuresets sozialer Netzwerkplattformen | Bachelor Defense | Tobias Urban | 15.15 | Sebastian Göndör |
Understanding Adherence to Ecological Momentary Assessments in the Example of the TYDR App | Master Defense | Wepan Chade | 15.45 | Katerina Katsarou, Felix Beierle |
SSI ActivityPub for Mastodon | Bachelor Initial | Adrian Isaias Sanchez | 16.15 | Sebastian Göndör |
Design and Implementation of a Cloud Wallet for Self-hosted Decentralized Services | Bachelor Defense | Emilia Schulenberg | 16.45 | Sebastian Göndör |
Comparative study of causal discovery methods | Bachelor Initial | Mustafa Mohsen | 17.15 | Boris Lorbeer |
Title | Presentation | Students | Time | Supervisor |
Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Master Defense | Juba Saadi | 14.15 | Sebastian Göndör |
Abstractive text summarization of scientific articles from the Biomedical domain | Master Defense | Uttam Dhakal | 14.45 | Aikaterini Katsarou |
Implementing a NDNCERT Challenge based on Verifiable Credentials | Bachelor Initial | David Barkemeyer | 15.15 | Aljoscha Schulte |
Implementing Verifiable Credentials in ICN/NDN | Master Initial | Andreas Kalz | 15.45 | Aljoscha Schulte |
State Persistence Evaluation for Stateful Serverless Platforms | Master Defense | Umar Nawaz | 16.15 | Maria Mora Martinez |
Feature-based Multi-Document Summarisation | Master Defense | Denisa Rucaj | 16.45 | Bianca Lüders, Aikaterini Katsarou |
Title | Presentation | Students | Time | Supervisor |
Analyzing AMM Liquidity Draining Events | Master Defense | Grigori Akimov | 14.15 | Friedhelm Victor |
Fraud Detection on Automated Market Maker Exchanges | Master Defense | Melanie Skodzik | 14.45 | Friedhelm Victor |
Runtime Process Adaption in PROCEED | Bachelor Initial | Janis Joderi Shoferi | 15.15 | Kai Grunert |
Process Creation with a Voice Assistant | Bachelor Defense | Imke Dungs | 15.45 | Kai Grunert |
Identifying Structural Web Tracker Characteristics With Real-Time Graph Analysis | Bachelor Defense | Henry Schwerdtner | 16.15 | Philip Raschke |
An Intelligence Decision Support System for Test Optimization Purposes | Master Defense | Jie Liu | 16.45 | Aikaterini Katsarou |
Title | Presentation | Students | Time | Supervisor |
Coordinated Resolution of Compute Request in the Compute-Centric Networks | Master Defense | Liming Liu | 14.15 | Hai Dinh Tuan |
STARK-based Chain Relays | Bachelor Initial | Lukas Lee George | 14.45 | Martin Westerkamp |
Cross-Browser Comparison of Web Tracker Activity Using T.EX | Bachelor Initial | Fadel Alissa | 15.45 | Philip Raschke |
Datenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten Datenschutzmanagement | Bachelor Defense | Olesia Tsaplina | 16.15 | Sebastian Göndör, Philip Raschke |
Title | Presentation | Students | Time | Supervisor |
STARK-based Chain Relays | Bachelor Initial | Lukas Lee George | 14.15 | Martin Westerkamp |
Cryptocurrency volatility prediction using sentiment analysis from social media | Master Initial | Shirkouh Matini | 14.45 | Aikaterini Katsarou |
Multi-domain Sentiment Analysis with an Active learning Mechanism | Master Initial | Nabil Douss | 15.15 | Aikaterini Katsarou |
Cross-Browser Comparison of Web Tracker Activity Using T.EX | Bachelor Initial | Fadel Alissa | 15.45 | Philip Raschke |
A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Master Initial | Ananta Lamichhane | 16.15 | Tobias Eichinger |
A MATSim-based Data Diffusion Model for Dissemination-based Collaborative Filtering | Master Initial | Mingzhi Wang | 16.45 | Tobias Eichinger |
This section covers general topics and frequently asked questions about the organizational process of bachelor, master and diploma theses at our department. Please read this page carefully before contacting one of the supervisors so that you are well prepared when you express your interest and discuss the topics with the supervisors.
Workflow
The organizational workflow of a bachelor's, master's or diploma thesis at SNET is described below:
Please note that it must be submitted at least 6 weeks before the end of the semester to ensure that you receive your grade in the same semester. Therefore, you must register your thesis with the Examination Office at least 4 months + 6 weeks for Bachelor's theses and 6 months + 6 weeks for Master's theses prior to submission.
Also when preparing a thesis, please observe the following instructions: