CYD Master Thesis Topics

1

5G Security investigation in a realistic 5G Lab

2

Distance Bounding in Aircraft Collision Avoidance Sytems

3

Measuring innovation structures and dynamics of cyber-related technologies: a knowledge-graph approach

4

Measuring risks and benefits of emerging cyber-related technologies: a knowledge-graph approach

5

Exploring production-capability networks of cyber-related technologies: a forecast by analogy approach

6

ICT innovation as a cascading process of collective intelligence: a network approach

7

Capturing innovation dynamics through cascading processes: a non-linear dynamic approach

8

Modelling portfolios of cyber-related emerging technologies: a complex-system approach

9

Capturing the net-present value of cyber-related technologies: a real-option approach

10

Mapping the (swiss) cyber-security research landscape using dynamic network analysis

11

A life-course perspective of technology development

12

Unsupervised learning for international cluster detection in technology development

13

Data visualization: presenting complex data from TMM interactively in an effective manner for decision-makers using JavaScript (e.g. dashboards, interactive infographics, “real-time” radar, etc.)

14

Follow the money: automatically identifying emerging (security) technologies using financial open data (e.g. from the stock market, business models, deal sourcing, fundamental and technical analysis, etc.)

15

Automatically detecting knowledge transfer and procurement opportunities for armasuisse using open data

16

Sentiment analysis: automatically identifying emerging (security) technologies using natural language processing on social media open data (e.g. Twitter, LinkedIn, etc.)

17

Longitudinal studies: forecasting (security) technologies trends using time series / panel data for causality testing

18

Automatic scoring of technology uniqueness using machine learning

19

Data mining: automatically identifying emerging (security) technologies by extracting strategic insights from patent data

20

Automatically identifying Swiss high-value targets (firms, individuals) at high-risk for industrial espionage using open data

21

Automatically assessing emerging (security) technologies for risks (and opportunities) using threat intelligence platforms open data (e.g. OTX, MISP, etc.)

22

Taxonomies, ontologies and knowledge graphs: how to systemically and automatically cluster emerging (security) technologies using open data (e.g. Wikipedia, NOGA, etc.)

23

Language detection on short texts and how to distinguish closely related languages

24

Quantifying the impact of source language similarity in multilingual neural machine translation?

25

Causality in social media analysis

26

Tipping points: the cause of disruptive mega-trends?

27

Explicit path routing in untrusted inter-domain networks

28

Secure container virtualization for smartphone OS based on Linux and Android

29

Smartphone secure element integration in Linux to encrypt Android containers and other cryptographic operations

30

Driver virtualisation multiplexing for a secure mobile operating system

31

Framework for automated vulnerability collection (crawl vulnerability databases, analyze software changes, categorize vulnerability)

32

Security analysis of IoT systems (methodology, attack vectors, weaknesses)

33

Deep learning computation speed-up using in-memory computing

34

Evaluating privacy risks of wearable device data

35

Data obfuscation for privacy-preserving machine learning

36

Machine learning for security and privacy analysis

37

Analysis of the effect of trust information on deep learning

38

Developing models for trust computing based on sensor behavior

39

Deep learning models for sensor behavior profiling

40

Sensor location identification through ADS-B and LTE broadcasting

41

Advanced GPS Attacks

42

Micro UAV Security

43

Security and Privacy of Satellite Communications

44

Machine-Learning Based Localization Algorithms

45

Security Analysis and Practical Attacks on Aircraft Avionics

46

Adversarial Machine Learning in Real-World Systems

47

Network traffic classification and continual learning in a real monitoring environment

48

Intelligent decoys: dynamic containers for medium interacion decoys

49

Cyber red team automation: automated reconnaissance, choice of attack path and system exploitation

50

A software ciphering implementation for voice calls and voice conferences

51

Automated input generation to reach certain code parts in a binary

52

Improved symbolic exection for complex binaries

53

Automated COM/DCOM security testing

54

Security of contact tracing applications

55

Privacy leaks in IoT wireless communication protocols

56

Unsupervised learning for radio signal decoding

57

Privacy risks in mobile applications

Contact

Research Office

Av. Auguste-Piccard 1
CH – 1015 Lausanne


Contact: [email protected]