News: |
The lecture is organized via Olat. |
Lecture: |
Videos of the lecture will be uploaded in the Olat. |
Exercises: |
Exercise-sheets will be uploaded in the Olat. |
Exam: |
TBA |
Contact: |
Prof. Dr.-Ing. Jens Schmitt |
This course gives an introduction to secure communication in computer networks. Topics covered in this lecture include:
News: |
The lecture is organized via Olat. |
Lecture: |
Videos of the lecture will be uploaded in the Olat. It is ecpected to use the videos to prepare for the presence lecture. Every two weeks the presence lecture will take place in 48-210. |
Exercises: |
Exercise-sheets will be uploaded in the Olat. |
Exam: |
TBA |
Contact: |
Prof. Dr.-Ing. Jens Schmitt |
This course gives an introduction to secure communication in computer networks. Topics covered in this lecture include:
News: |
This lecture will be organized via OLAT |
Examination: |
To be announced |
Lecture: |
Live stream, every Friday 12:00-13:30 |
Contact: |
Matthias Schäfer |
This course covers aspects and principles of network security. Based on many attacks on common technologies used in communication systems, this course illustrates how things can go wrong and provides basic measures to protect a network from mistakes committed in the past. It covers furthermore the fundamental concepts of security and security problems.
Areas covered in this lecture:
Please note that it is strongly recommended to attend communication systems first since it provides the background knowledge for this lecture.
The lecture is organized via OLAT. To register for the lecture an get access to the material, please proceed to this link:
You will have to register in order to receive the links to the live lecture, updates and to get access to material (slides).
This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2020/2021. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":
The workshop is organised in a typical computer science research conference manner. It consists of three phases, each associated with a deadline that is provided further below:
After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, successful participation in this workshop (including all three phases) is mandatory and a formal prerequisite of the exam. Successful participation means that the final rating of your essay must be above 0,5 (on a Likert scale) and it must comply with these guidelines.
Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organised.
Essay submission: | Friday, 15.01.2021 (23:59) |
Reviews: | Friday, 29.01.2021 (23:59) |
Final version: | Friday, 12.02.2021 (23:59) |
In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following instructions carefully and make sure your essay complies with the submission guidelines.
After you've successfully submitted your essay, it's time to start the reviewing phase of the workshop. Therefore, you will be added to the so called "Program Committee" on Easychair and Yasmina will assign two essays to everyone of you. If you have no EasyChair account yet, make sure you register using the same email address your group mate entered for your submission. The reviews will be double-blind. This means that neither you know who you are reviewing, nor the other authors will know who reviewed them.
Start with reading the essays assigned to you carefully and then fill in the review form in EasyChair for each essay. You will find the essays assigned to you under "Reviews->Assigned to me". To submit a review, click on the "+"-Button and enter your review into the form. Each section in the review (summary/strengths/weaknesses) should have around 100 words. Be concise and provide constructive arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2). Based on this final rating, we will make our final decision about whether you'll have to improve your essay in the revision phase or not in order to pass this workshop.
Plagiarism: Please also check for plagiarism (see instructions above). In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism would be if the essay is almost completely copied from other works or if content of other works is used without properly referencing the original source.
Misc: If you have any additional comments you would like us to know (but not the authors), use the comments field in the submission form.
This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2021/2022. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":
The workshop is organised in a typical computer science research conference manner. It consists of three phases, each associated with a deadline that is provided further below:
After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, successful participation in this workshop (including all three phases) is mandatory and a formal prerequisite of the exam. Successful participation means that the final rating of your essay must be above 0,5 (on a Likert scale) and it must comply with these guidelines.
Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organised.
Essay submission: | Friday, 14.01.2022 (23:59) |
Reviews: | Friday, 28.01.2022 (23:59) |
Final version: | Friday, 11.02.2022 (23:59) |
In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following instructions carefully and make sure your essay complies with the submission guidelines.
After you've successfully submitted your essay, it's time to start the reviewing phase of the workshop. Therefore, you will be added to the so called "Program Committee" on Easychair and Yasmina will assign two essays to everyone of you. If you have no EasyChair account yet, make sure you register using the same email address your group mate entered for your submission. The reviews will be double-blind. This means that neither you know who you are reviewing, nor the other authors will know who reviewed them.
Start with reading the essays assigned to you carefully and then fill in the review form in EasyChair for each essay. You will find the essays assigned to you under "Reviews->Assigned to me". To submit a review, click on the "+"-Button and enter your review into the form. Each section in the review (summary/strengths/weaknesses) should have around 100 words. Be concise and provide constructive arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2). Based on this final rating, we will make our final decision about whether you'll have to improve your essay in the revision phase or not in order to pass this workshop.
Plagiarism: Please also check for plagiarism (see instructions above). In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism would be if the essay is almost completely copied from other works or if content of other works is used without properly referencing the original source.
Misc: If you have any additional comments you would like us to know (but not the authors), use the comments field in the submission form.
We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...