The slides (PDF, 873 KB) shown during the seminar introduction summarize important thematic and organizational aspects of this seminar. Consider in addition the following material:
- Guideline (in German) to write a written seminar report (PDF, 192 KB)* (A new version will appear soon.): This document contains on just two pages a summary of the most relevant information on how to structure a report, on style in writing, and on the rules of how to reference and cite in a correct as well as complete way. All students are required to take these guidelines carefully into account when preparing the seminar report..
- Seminar procedures (PDF, 257 KB): This document lists seminar procedures such as delivery deadlines or requirements on moderated discussions. Students have to fulfill all mandatory criteria mentioned in the PDF and they have to be present in all (minus one) seminar dates in order to pass the seminar.
- For the seminar report, a LaTeX template (ZIP, 330 KB)* is provided. Its use is mandatory.
The detailed description for the subsequently listed seminar topics is made available for download in PDF format here (PDF, 327 KB).
|Talk||Title||Student / Speaker||Supervisor||Date|
|1||Suitability of Existing Blockchains for IoT Use Cases||Ile Cepilov, Erion Sula, Jonas Brunner, Tobias Boner||Sina Rafati||February, 27th|
|2||When Cybersecurity Meets Artificial Intelligence||Michèle Fundneider, Ramize Abdili||Muriel Franco||March 05th|
|3||An Overview on the State-of-the-Art of Intent-based Systems||Damaris Schmid, Christoph Faessler, Fabian Kuenzler||Eder Scheid||March 12th|
|4||Technologies and Applications for Passive Wireless Sensing||Jonas Guler, Philipp Moor||Bruno Rodrigues||March 19th|
|5||Past, Present and Future of Remote Electronic Voting||Melanie Salzer, Isabel Margolis, Michael Küchler, Clara-Maria Barth||Christian Killer||March 26th|
|6||Analysis of Impacts of Cyber Insecurity on Society||
Dominik Arni, Bulin Shaqiri, Christian Omlin, Calvin Falter
|Muriel Franco||April 2nd|
|7||Overview of the IETF Distributed Denial-of-Service Open Threat Signaling (DOTS)||Jan von der Assen, Luc Boillat, Fabio Maddaloni, Timo Surbeck||Bruno Rodrigues||April 9th|
|8||TBA||Kevin Steijn, Shubhankar Joshi, Yuang Cheng, Yue Ding||Eryk Schiller||April 23rd|
|9||Blockchain and IoT Integration Architectures||Rabiya Abdullah, Abhinav Aggarwal, Annesha Bhoumik, Daniel Alfred Klaus||Sina Rafati||April 30th|
|10||Bug Bounties: The Cure For Public Hacks?||Christoph Vogel, Claude Müller, Adilla Böhmer||Christian Killer||May 7th|
|11||The Impact of eSIM on Subscriber Security in Future 5G Communications||
Roman Schmid, Florian Ulrich,
|Eryk Schiller||May 14th|
|12||Blockchain Selection: Factors Impacting on the Selection, Decision Support Models, and Systems||Marjan Shabani, Omnia S. Elsaadany, Olajoke Oladipo||Eder Scheid||May 28th|
* These files can be downloaded from within the university network. Please use a VPN client from outside the university network.