Erinevus lehekülje "Aleksandr Lenin MSc Thesis topics" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
(Kustutatud kogu lehekülje sisu)
 
(ei näidata sama kasutaja 29 vahepealset redaktsiooni)
1. rida: 1. rida:
=== Introduction ===
 
  
Dear cybersecurity students,
 
 
all the final thesis topics, offered by me, are directly or indirectly related to the EU FP7 project '''''[http://trespass-project.eu/ TREsPASS]'''''. This project and the related research area in general, are the main focus of my research activities.
 
 
What does this mean for you? The topics I offer are practically oriented, these topics are not something invented from scratch, but areas of research and development that need to be done, which is a merit, of course. The downside of writing your final thesis on the topic which is part of an EU project is that these activities have, as a rule, their corresponding deadlines, which are, in general, not flexible. The deadlines indicated below are not the deadlines when your final thesis document has to get ready -- these are related to some internal deadlines within the project and set the time when the result has to be delivered. This means that the result ''has to be provided'' by the deadline and no extensions are allowed. These deadlines, as you can see below, are, as a rule, earlier, than the planning time of the defense. If you take such a topic, you ''have'' to provide an idea or solution ''before'' the deadline, and once the result is delivered, you may spend the rest of the time writing your final thesis document.
 
 
In the list of topics below you will see:
 
* current ''priority'' of the topic: ''<span style="color: #f00;">High</span>'', ''<span style="color: #ff0;">Medium</span>'', or ''<span style="color: #0f0;">Low</span>''. This describes the degree of "urgency" within the project on the specified topic.
 
* current ''status'' of the topic: ''<span style="color: #0f0;">Pending</span>'' which means that the topic is free to choose, or ''<span style="color: #f00;">In Progress</span>'' which means that some student is already working on the topic.
 
* The ''due date'' - the approximate date when the results have to be delivered and end up in the project documentation.
 
 
Some topics are more complicated, some are less, and they require various background and knowledge from the students. This means that not every topic will suit everyone equally.
 
 
The minimal requirements for the student are the following:
 
* Being active and willing to defend your final thesis.
 
* Good communication skills in English (spoken and written).
 
* Mean result at least "good" for the courses in your curricula.
 
* Skills to work independently, as well as in a team.
 
* Being self-sufficing. Given a task and the description what do we need to obtain, being able to find the way how to do it independently.
 
 
Additional requirements for the students willing to write this or that topic under my supervision is described in the detailed description of the topic. To get approval for the topic you need to meet me in person, and I assess if you are suitable to write the chosen topic, then will either approve the suprtvision or not.
 
 
A general requirement for the final thesis of the student is that it must be a good piece of work, which is worth grade not less, than 4. If for some reason I feel that your work is not sufficiently well written, I reserve the right not to allow this work for the defense and postpone it for the next semester's defence dates.
 
 
I treat the work of every master student, who writes a thesis under my supervision, as a raw material for the upcoming publication. The vast majority of the topics offered below will be published in articles. For this reason, I assume that prospective master students might be interested in assisting writing a paper and being a co-author of it.
 
 
=== Thesis topics to offer ===
 
 
 
'''Algorithms for Security Analysis:'''
 
* [TREsPASS] A genetic (evolutionary) algorithm for the Failure-Free risk assessment model.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #f00;">In progress</span> Due: April 2015]'''
 
* [TREsPASS] Attack scenario transformation component. Design and implementation.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #f00;">In progress</span> Due: April 2015]'''
 
* [TREsPASS] Comparison of the genetic algorihm for the Failure-Free model with the Failure-Free model upper bounds estimation. Assessment of performance. Benchmarking and analysis.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #ff0;">Medium</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
 
 
 
'''Security Modelling:'''
 
* [TREsPASS] A structure for representing attack scenarios in the form of attack graphs in xml file.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
 
* Attack Process Graphs -- a new look into security modelling and analysis.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
 
 
 
'''Fuzzy Metrics for Security:'''
 
* [TREsPASS] Fuzziness as a measure of uncertainty in quantitative security metrics.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #f00;">In progress</span> Due: April 2015]'''
 
 
 
'''Fuzzy decision making and control:'''
 
* [TREsPASS] Fuzzy attacker profiling
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #ff0;">Medium</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
 
 
* [TREsPASS] Fuzzy reasoning and computations for the Failure-Free risk assessment model.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #ff0;">Medium</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
 
 
 
'''Security modelling patterns:'''
 
* [TREsPASS] ''APL (Attack Pattern Library)'' and ''MPL (Model Pattern Library)'' design and implementation.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #0f0;">Pending</span> Due: April 2015]'''
 
 
* [TREsPASS] ''Social APL (Attack Pattern Library)'' design and implementation.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
 
 
* A library of attacker behavioral patterns.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
 
 
 
'''Quantitative Security Risk Analysis:'''
 
* [TREsPASS] Approximation of fully-adaptive strategies by the most optimal non-adaptive strategy. Assessment of precision and viability of the approach.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #ff0;">Medium</span> Status: <span style="color: #f00;">In Progress</span> Due: June 2015]'''
 
 
'''ISKE:'''
 
* [TREsPASS] ISKE-TREsPASS integration. Case study.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #f00;">In progress</span> Due: April 2015]'''
 
 
 
'''Security Games:'''
 
* Defender game for the quantitative security analysis models.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
 
 
* Attacker-defender strategic interaction. Stackleberg equilibrium and security analysis.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
 
 
=== Defended thesis topics ===
 
 
* Attacker Profiling in Quantitative Security Assessment [Defended: January 2014]
 
* Performance Analysis of Attacker Profiling in Quantitative Security Risk Assessment [Defended: June 2014]
 
* Assessment of Integration Possibilities of the TREsPASS Toolset into the ISKE tool [Defended: January 2015]
 

Viimane redaktsioon: 21. september 2018, kell 10:52