<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="et">
	<id>http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Hayretdin</id>
	<title>Kursused - Kasutaja kaastöö [et]</title>
	<link rel="self" type="application/atom+xml" href="http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Hayretdin"/>
	<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/pages/Eri:Kaast%C3%B6%C3%B6/Hayretdin"/>
	<updated>2026-05-21T19:58:27Z</updated>
	<subtitle>Kasutaja kaastöö</subtitle>
	<generator>MediaWiki 1.35.9</generator>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10522</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10522"/>
		<updated>2022-04-19T08:44:55Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021   &lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022 [https://moodle.taltech.ee/course/view.php?id=31426 submission link]&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
* GNSS jamming and spoofing of the unmanned vehicles&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
* Log Analysis &lt;br /&gt;
&lt;br /&gt;
Specific ideas:&lt;br /&gt;
&lt;br /&gt;
* Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html&lt;br /&gt;
* Domain name availability and how DNS registrant and registrar policy changes affect cybercrime&lt;br /&gt;
* Heuristics on ip leasing operations&lt;br /&gt;
* Defending organization that does not have internal network&lt;br /&gt;
* Do applications do what they promise&lt;br /&gt;
* Identifying specific applications based network fingerprints&lt;br /&gt;
* Evaluation log collecting methods for Microsoft networks considering log poisoning attacks&lt;br /&gt;
* Log collecting frameworks for organisations without internal networks&lt;br /&gt;
* Information attributes and their  influence on the organisational security beyond CIA&lt;br /&gt;
* Frame works for cybersecurity devices / software evaluation&lt;br /&gt;
* Evaluation specific software /hardware using ATT&amp;amp;CK Framwork&lt;br /&gt;
* ATT&amp;amp;CK -Descriptions and false positives &lt;br /&gt;
* Anatomy of cyber fractions during the Russian-Ukrainian war&lt;br /&gt;
* Forensic Leaked materials of cyber criminal groups.&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
&lt;br /&gt;
* Security implications in Migrating Taltech Campus LAN to IPv6; Toomas Lepik&lt;br /&gt;
* Improving SOC and Information security processes; Toomas Lepik&lt;br /&gt;
* Auditing  Taltech EITS compliance based on public information; Toomas Lepik&lt;br /&gt;
* Improving Log analysis pipelines; Toomas Lepik&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10521</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10521"/>
		<updated>2022-04-19T08:44:05Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021  [https://moodle.taltech.ee/course/view.php?id=31426 submission] &lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
* GNSS jamming and spoofing of the unmanned vehicles&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
* Log Analysis &lt;br /&gt;
&lt;br /&gt;
Specific ideas:&lt;br /&gt;
&lt;br /&gt;
* Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html&lt;br /&gt;
* Domain name availability and how DNS registrant and registrar policy changes affect cybercrime&lt;br /&gt;
* Heuristics on ip leasing operations&lt;br /&gt;
* Defending organization that does not have internal network&lt;br /&gt;
* Do applications do what they promise&lt;br /&gt;
* Identifying specific applications based network fingerprints&lt;br /&gt;
* Evaluation log collecting methods for Microsoft networks considering log poisoning attacks&lt;br /&gt;
* Log collecting frameworks for organisations without internal networks&lt;br /&gt;
* Information attributes and their  influence on the organisational security beyond CIA&lt;br /&gt;
* Frame works for cybersecurity devices / software evaluation&lt;br /&gt;
* Evaluation specific software /hardware using ATT&amp;amp;CK Framwork&lt;br /&gt;
* ATT&amp;amp;CK -Descriptions and false positives &lt;br /&gt;
* Anatomy of cyber fractions during the Russian-Ukrainian war&lt;br /&gt;
* Forensic Leaked materials of cyber criminal groups.&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
&lt;br /&gt;
* Security implications in Migrating Taltech Campus LAN to IPv6; Toomas Lepik&lt;br /&gt;
* Improving SOC and Information security processes; Toomas Lepik&lt;br /&gt;
* Auditing  Taltech EITS compliance based on public information; Toomas Lepik&lt;br /&gt;
* Improving Log analysis pipelines; Toomas Lepik&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10169</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10169"/>
		<updated>2021-09-13T05:46:45Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Aviation Cybersecurity lab&lt;br /&gt;
* Maritime technology.&lt;br /&gt;
* WAN networks&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10009</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10009"/>
		<updated>2021-04-19T10:05:09Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2021 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 3rd August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: DEC 7th 2020 in Moodle [https://moodle.taltech.ee/course/view.php?id=31016] KEY: eAsUMTS&lt;br /&gt;
* OIS declaration: DEC 14th 2020 - deadline for submitting the application for defense of graduation thesis&lt;br /&gt;
* Submission of the final version of the thesis: DEC 21st 2020&lt;br /&gt;
* Defences: JAN 11th 2021&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2021 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 14 December 2020 in Moodle [https://moodle.taltech.ee/mod/assign/view.php?id=338668]: no key is needed  &lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2021 in Moodle [https://moodle.taltech.ee/mod/assign/view.php?id=375802]: no key is needed &lt;br /&gt;
* OIS declaration: 10 May 2021&lt;br /&gt;
* Submission of the final version of the thesis: 14 May 2021&lt;br /&gt;
* Defences: 27-28 May &amp;amp; 30 May-1 June 2021&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in SCADA or IoT systems or cyber threat intelligence    &lt;br /&gt;
* Cyber security of IoT systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: IoT forensics, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Aviation Cybersecurity lab&lt;br /&gt;
* Maritime technology.&lt;br /&gt;
* WAN networks&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10008</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10008"/>
		<updated>2021-04-19T10:04:50Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2021 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 3rd August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: DEC 7th 2020 in Moodle [https://moodle.taltech.ee/course/view.php?id=31016] KEY: eAsUMTS&lt;br /&gt;
* OIS declaration: DEC 14th 2020 - deadline for submitting the application for defense of graduation thesis&lt;br /&gt;
* Submission of the final version of the thesis: DEC 21st 2020&lt;br /&gt;
* Defences: JAN 11th 2021&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2021 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 14 December 2020 in Moodle [https://moodle.taltech.ee/mod/assign/view.php?id=338668]: no key is needed  &lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2021 [https://moodle.taltech.ee/mod/assign/view.php?id=375802]: no key is needed &lt;br /&gt;
* OIS declaration: 10 May 2021&lt;br /&gt;
* Submission of the final version of the thesis: 14 May 2021&lt;br /&gt;
* Defences: 27-28 May &amp;amp; 30 May-1 June 2021&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in SCADA or IoT systems or cyber threat intelligence    &lt;br /&gt;
* Cyber security of IoT systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: IoT forensics, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Aviation Cybersecurity lab&lt;br /&gt;
* Maritime technology.&lt;br /&gt;
* WAN networks&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9777</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9777"/>
		<updated>2020-12-08T12:40:58Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis info for Cyber Security students */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 3rd August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: DEC 7th 2020 in Moodle [https://moodle.taltech.ee/course/view.php?id=31016] KEY: eAsUMTS&lt;br /&gt;
* OIS declaration: DEC 14th 2020 - deadline for submitting the application for defense of graduation thesis&lt;br /&gt;
* Submission of the final version of the thesis: DEC 21st 2020&lt;br /&gt;
* Defences: JAN 11th 2021&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2021 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 14 December 2020 in Moodle [https://moodle.taltech.ee/mod/assign/view.php?id=338668]: no key is needed  &lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in SCADA or IoT systems or cyber threat intelligence    &lt;br /&gt;
* Cyber security of IoT systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: IoT forensics, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Currently only accepting students who have previously passed CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9581</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9581"/>
		<updated>2020-09-26T07:43:45Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Arnis Paršovs, University of Tartu, arnis@ut.ee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 3rd August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: DEC 7th 2020&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: DEC 21st 2020&lt;br /&gt;
* Defences: JAN 11th 2021&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2021 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 14 December 2020 &lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in SCADA or IoT systems or cyber threat intelligence    &lt;br /&gt;
* Cyber security of IoT systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: IoT forensics, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Currently only accepting students who have previously passed CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9364</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9364"/>
		<updated>2020-08-28T12:15:03Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 4 August 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 3rd August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in SCADA or IoT systems or cyber threat intelligence    &lt;br /&gt;
* Cyber security of IoT systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: IoT forensics, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Currently only accepting students who have previously passed CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9362</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9362"/>
		<updated>2020-08-28T12:12:51Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 4 August 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 3rd August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in SCADA or IoT systems or cyber threat intelligence    &lt;br /&gt;
* Cyber security of IoT systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: IoT forensics, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Currently only accepting students who have previously passed CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9349</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9349"/>
		<updated>2020-07-16T08:03:51Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for August 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 4 August 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 10 August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Currently only accepting students who have previously passed CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9348</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9348"/>
		<updated>2020-07-16T08:00:54Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for August 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 4 August 2020&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 10 August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Currently only accepting students who have previously passed CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9346</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9346"/>
		<updated>2020-06-08T09:03:29Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis info for Cyber Security students */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 3 August 2020&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 10 August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only accepting students who have taken the CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9345</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9345"/>
		<updated>2020-06-08T09:02:38Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis info for Cyber Security students */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 3 August 2020&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2021 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 10 August 2020&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only accepting students who have taken the CNS.073.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9335</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9335"/>
		<updated>2020-05-21T07:11:01Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for August 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020 [https://ained.ttu.ee/mod/quiz/view.php?id=9079 via ained]&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 3 August 2020&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have only one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9334</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9334"/>
		<updated>2020-05-21T06:36:08Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020 [https://ained.ttu.ee/mod/quiz/view.php?id=9079 via ained]&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for August 2020 Defence ==&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 3 August 2020&lt;br /&gt;
* Defences: 17-18 August 2020 &lt;br /&gt;
&lt;br /&gt;
Coronavirus crisis has impacted some of the thesis studies due to the in-place restrictions or other reasons. Therefore, we have an additional defence in August 2020 as the main deadlines are given above. This defence will have one final submission date. OIS declaration that has been done on 11 May 2020 will be also valid for this defence.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9270</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9270"/>
		<updated>2020-04-14T09:42:10Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020 [https://ained.ttu.ee/mod/quiz/view.php?id=9079 via ained]&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9134</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9134"/>
		<updated>2020-02-17T08:23:25Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Useful links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020 [https://ained.ttu.ee/mod/quiz/view.php?id=9079 via ained]&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9133</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9133"/>
		<updated>2020-02-17T08:22:01Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Useful links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020 [https://ained.ttu.ee/mod/quiz/view.php?id=9079 via ained]&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9000</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=9000"/>
		<updated>2020-01-02T06:50:15Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for January 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020 [https://ained.ttu.ee/mod/quiz/view.php?id=9079 via ained]&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience with security monitoring technologies. Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8947</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8947"/>
		<updated>2019-11-28T07:50:44Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019 [https://ained.ttu.ee/course/view.php?id=297 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience with security monitoring technologies. Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8938</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8938"/>
		<updated>2019-11-27T06:56:19Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for January 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019 [https://ained.ttu.ee/mod/assign/view.php?id=9078 via ained]&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience with security monitoring technologies. Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8937</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8937"/>
		<updated>2019-11-27T06:54:30Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Registration and submission of problem statement and research design document */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience with security monitoring technologies. Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8936</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8936"/>
		<updated>2019-11-27T06:52:32Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Registration and submission of problem statement and research design document */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
• Research Problem/Hypothesis/Question&lt;br /&gt;
  It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
• Scope and Goal &lt;br /&gt;
  This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
• Literature Review&lt;br /&gt;
  This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
• Novelty&lt;br /&gt;
  This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies. &lt;br /&gt;
• Research Methods &lt;br /&gt;
  The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated. &lt;br /&gt;
• References&lt;br /&gt;
  The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience with security monitoring technologies. Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8935</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8935"/>
		<updated>2019-11-27T06:51:58Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Registration and submission of problem statement and research design document */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
• The name of the author&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
• Motivation&lt;br /&gt;
  An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
• Research Problem/Hypothesis/Question&lt;br /&gt;
  It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
• Scope and Goal &lt;br /&gt;
  This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
• Literature Review&lt;br /&gt;
  This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
• Novelty&lt;br /&gt;
  This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies. &lt;br /&gt;
• Research Methods &lt;br /&gt;
  The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated. &lt;br /&gt;
• References&lt;br /&gt;
  The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
=====General areas:=====&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience with security monitoring technologies. Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8699</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8699"/>
		<updated>2019-09-26T09:34:42Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: 23 April 2020&lt;br /&gt;
* OIS declaration: 11 May 2020&lt;br /&gt;
* Submission of the final version of the thesis: 19 May 2020&lt;br /&gt;
* Defences: 28-29 May 2020, 1-2 June 2020 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TalTech regulations. The students who have a supervisor from TalTech but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8698</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8698"/>
		<updated>2019-09-26T09:32:43Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for January 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: 9 December 2019&lt;br /&gt;
* OIS declaration: 16 December 2019&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2020&lt;br /&gt;
* Defences: 9-10 January 2020&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
Only very limited slots for 2020, accepting students working towards January &amp;#039;&amp;#039;&amp;#039;2021&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8639</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8639"/>
		<updated>2019-09-18T10:54:09Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Master Thesis Process and Supervising - Hayretdin Bahsi [[File:Thesis_Process_and_Supervising.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8638</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8638"/>
		<updated>2019-09-18T10:53:51Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Master Thesis Process and Supervising - Hayretdin Bahsi [[Thesis_Process_and_Supervising.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8637</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8637"/>
		<updated>2019-09-18T10:53:32Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Master Thesis Process and Supervising - Hayretdin Bahsi [[:Media:Thesis_Process_and_Supervising.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8636</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8636"/>
		<updated>2019-09-18T10:52:46Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Master Thesis Process and Supervising - Hayretdin Bahsi [[:File:Thesis_Process_and_Supervising.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8635</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8635"/>
		<updated>2019-09-18T10:52:05Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Master Thesis Process and Supervising - Hayretdin Bahsi [[File:Thesis_Process_and_Supervising.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8634</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8634"/>
		<updated>2019-09-18T10:51:25Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Theses Supervising - Hayretdin [[File:Thesis_Process_and_Supervising.pdf]]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8633</id>
		<title>CyberResearch</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=CyberResearch&amp;diff=8633"/>
		<updated>2019-09-18T10:50:10Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* 17 Sept */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Planning for the research group meeting on &amp;#039;&amp;#039;&amp;#039;Tuesday&amp;#039;s at 1400 in ICT-411.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Presentations from previous weeks are located here https://gitlab.cs.ttu.ee/cybersec/weekly/wikis/home  and are accessible for CyberResearch group only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 03 Sept ==&lt;br /&gt;
&lt;br /&gt;
Meeting Eesti Energia representatives&lt;br /&gt;
&lt;br /&gt;
*overview of our group, capabilities&lt;br /&gt;
*overview of Eesti Energia structure, processes etc.&lt;br /&gt;
*collaboration possibilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kieren Lovell - Cambridge Summerschool Spearphishing attack&lt;br /&gt;
&lt;br /&gt;
And guest lecturers from Brno university Lukáš Hellebrandt and Ondřej Hujňák - overview of their research, potential collaboration&lt;br /&gt;
&lt;br /&gt;
== 17 Sept ==&lt;br /&gt;
&lt;br /&gt;
Internal Comms: after Curr.Dev.Days and onwards - Martha &amp;amp; Kristi&lt;br /&gt;
&lt;br /&gt;
Theses Supervising - Hayretdin [File:Thesis_Process_and_Supervising.pdf]&lt;br /&gt;
&lt;br /&gt;
== 24 Sept ==&lt;br /&gt;
&lt;br /&gt;
Kelly O’Brien from Embry-Riddle University (USA) - topic TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Oct ==&lt;br /&gt;
&lt;br /&gt;
Risto Vaarandi - Improving Learning Efficiency and Evaluation Fairness for Cyber Security Courses: a Case Study&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5 Nov ==&lt;br /&gt;
&lt;br /&gt;
Anna-Maria Osula&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Fail:Thesis_Process_and_Supervising.pdf&amp;diff=8632</id>
		<title>Fail:Thesis Process and Supervising.pdf</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Fail:Thesis_Process_and_Supervising.pdf&amp;diff=8632"/>
		<updated>2019-09-18T10:46:58Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8529</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8529"/>
		<updated>2019-09-06T07:08:49Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Bernhards Blumbergs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8528</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8528"/>
		<updated>2019-09-06T07:05:27Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Submission to Reviewer */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8527</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8527"/>
		<updated>2019-09-06T07:03:34Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis Defence Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8526</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8526"/>
		<updated>2019-09-06T07:00:36Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Registration and submission of problem statement and research design document */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The opponent will review your thesis and give you feedback. Expect that you should receive the review from your opponent about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the feedback items into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8525</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8525"/>
		<updated>2019-09-06T06:46:55Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis Defence Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The opponent will review your thesis and give you feedback. Expect that you should receive the review from your opponent about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the feedback items into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8524</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8524"/>
		<updated>2019-09-06T06:32:55Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2020 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: 11 December 2019&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4-semester study plan and aim to defend in the June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8523</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8523"/>
		<updated>2019-09-06T06:24:02Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From the Tartu University thesis topic registry */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4-semester study plan and aim to defend in the June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
You can check the possible cyber security-related topics from the following link:&lt;br /&gt;
https://comserv.cs.ut.ee/ati_thesis_offers/&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8522</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8522"/>
		<updated>2019-09-06T06:23:20Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From the Tartu University thesis topic registry */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4-semester study plan and aim to defend in the June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
Tou can check the possible cyber security-related topics from the following link:&lt;br /&gt;
[https://comserv.cs.ut.ee/ati_thesis_offers/]&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8521</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8521"/>
		<updated>2019-09-06T06:21:39Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From the TUT IT office */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4-semester study plan and aim to defend in the June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8508</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8508"/>
		<updated>2019-09-04T06:39:02Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis info for Cyber Security students */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May 2020 Defence ==&lt;br /&gt;
* Submission of the problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have a supervisor from TTU but want to defend their theses in Tartu University in order to fulfil the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to the reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4-semester study plan and aim to defend in the June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8437</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8437"/>
		<updated>2019-06-12T07:53:47Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
== Important Deadlines for May 2019 Defence ==&lt;br /&gt;
* Submission of the final version of the thesis: 13 May 2019  [https://ained.ttu.ee/course/view.php?id=228 via ained]&lt;br /&gt;
* OIS declaration: 13 May 2019&lt;br /&gt;
* Bring one paper copy of the thesis (with a cover hard or soft) on May 20th to Siiri Taveter in ICT-429 at between 10-12 and 13-16&lt;br /&gt;
* Defences: 27-30 May 2019&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have supervisor from TTU but want to defend their theses in Tartu University in order to fulfill the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending a MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview over the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4 semester study plan and aim to defend in June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8436</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8436"/>
		<updated>2019-06-12T07:52:21Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
== Important Deadlines for May 2019 Defence ==&lt;br /&gt;
* Submission of the final version of the thesis: 13 May 2019  [https://ained.ttu.ee/course/view.php?id=228 via ained]&lt;br /&gt;
* OIS declaration: 13 May 2019&lt;br /&gt;
* Bring one paper copy of the thesis (with a cover hard or soft) on May 20th to Siiri Taveter in ICT-429 at between 10-12 and 13-16&lt;br /&gt;
* Defences: 27-30 May 2019&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have supervisor from TTU but want to defend their theses in Tartu University in order to fulfill the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending a MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview over the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4 semester study plan and aim to defend in June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8435</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8435"/>
		<updated>2019-06-12T07:07:26Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* From Kaie Maennel, Tallinn University of Technology */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
== Important Deadlines for May 2019 Defence ==&lt;br /&gt;
* Submission of the final version of the thesis: 13 May 2019  [https://ained.ttu.ee/course/view.php?id=228 via ained]&lt;br /&gt;
* OIS declaration: 13 May 2019&lt;br /&gt;
* Bring one paper copy of the thesis (with a cover hard or soft) on May 20th to Siiri Taveter in ICT-429 at between 10-12 and 13-16&lt;br /&gt;
* Defences: 27-30 May 2019&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have supervisor from TTU but want to defend their theses in Tartu University in order to fulfill the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending a MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview over the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4 semester study plan and aim to defend in June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management   &lt;br /&gt;
&lt;br /&gt;
Strategic Topics&lt;br /&gt;
&lt;br /&gt;
* High-level information flows and reporting mechanisms among the major entities of national cyber security governance structures&lt;br /&gt;
* Maturity models for the analysis of national cyber security capability&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8425</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8425"/>
		<updated>2019-06-05T08:36:23Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Thesis info for Cyber Security students */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
== Important Deadlines for May 2019 Defence ==&lt;br /&gt;
* Submission of the final version of the thesis: 13 May 2019  [https://ained.ttu.ee/course/view.php?id=228 via ained]&lt;br /&gt;
* OIS declaration: 13 May 2019&lt;br /&gt;
* Bring one paper copy of the thesis (with a cover hard or soft) on May 20th to Siiri Taveter in ICT-429 at between 10-12 and 13-16&lt;br /&gt;
* Defences: 27-30 May 2019&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 17 June 2019 [https://ained.ttu.ee/course/view.php?id=258 via ained]&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have supervisor from TTU but want to defend their theses in Tartu University in order to fulfill the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending a MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview over the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4 semester study plan and aim to defend in June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management   &lt;br /&gt;
&lt;br /&gt;
Strategic Topics&lt;br /&gt;
&lt;br /&gt;
* High-level information flows and reporting mechanisms among the major entities of national cyber security governance structures&lt;br /&gt;
* Maturity models for the analysis of national cyber security capability&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8353</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8353"/>
		<updated>2019-05-09T06:04:00Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2019 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
== Important Deadlines for May 2019 Defence ==&lt;br /&gt;
* Submission of the final version of the thesis: 13 May 2019  [https://ained.ttu.ee/course/view.php?id=228 via ained]&lt;br /&gt;
* OIS declaration: 13 May 2019&lt;br /&gt;
* Bring one paper copy of the thesis (with a cover hard or soft) on May 20th to Siiri Taveter in ICT-429 at between 10-12 and 13-16&lt;br /&gt;
* Defences: 27-30 May 2019&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2020 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have supervisor from TTU but want to defend their theses in Tartu University in order to fulfill the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending a MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview over the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4 semester study plan and aim to defend in June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management   &lt;br /&gt;
&lt;br /&gt;
Strategic Topics&lt;br /&gt;
&lt;br /&gt;
* High-level information flows and reporting mechanisms among the major entities of national cyber security governance structures&lt;br /&gt;
* Maturity models for the analysis of national cyber security capability&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8322</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=8322"/>
		<updated>2019-05-02T07:41:11Z</updated>

		<summary type="html">&lt;p&gt;Hayretdin: /* Important Deadlines for May 2019 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
== Important Deadlines for May 2019 Defence ==&lt;br /&gt;
* Submission of the final version of the thesis: 13 May 2019  [https://ained.ttu.ee/course/view.php?id=228 via ained]&lt;br /&gt;
* OIS declaration: 13 May 2019&lt;br /&gt;
* Bring one paper copy of the thesis (with a cover hard or soft) on May 20th to Siiri Taveter in ICT-429 at between 10-12 and 13-16&lt;br /&gt;
* Defences: 27-30 May 2019&lt;br /&gt;
&lt;br /&gt;
The procedure for thesis defence is set by TTU regulations. The students who have supervisor from TTU but want to defend their theses in Tartu University in order to fulfill the minimum credit requirements will follow the first two steps (registration and submission of problem statement and submission to reviewer) as given above. However, OIS declaration, submission of final version and defence should be done according to the deadlines and procedures of Tartu University.&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending a MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview over the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following 4 semester study plan and aim to defend in June period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, you should have an idea about your topic and you should have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
It is recommended that you take the literature review seminar ([https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;]) in the 3rd semester. The purpose of this seminar is two-fold: (a) you need to do a literature review for your thesis anyway (e.g., see [https://web.stanford.edu/class/cee320/CEE320A/POD.pdf here]), and (b) learning from others about research-papers they have read for their thesis broadens your overall horizon and should help you in discussing challenges you are facing in your own literature review.&lt;br /&gt;
&lt;br /&gt;
The purpose of the literature review is that you obtain a good understanding of the state-of-the-art research in your selected area of research. Typically during this reading phase, the problem statement (the question you aim to address/solve in your thesis) will be refined/changed.  You should aim to have a solid problem statement fixed and agreed with your supervisor during the 3rd semester, ideally well before December.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  Please reserve sufficient time for this, as this is going to be the main contribution of your thesis.  Plan to finish this work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor you should then make a decision if your work is ready to be submitted for June defence (or if you need more time and prefer to submit for a January defence).  For students planning to defend in June, expected deadline to submit your thesis for review, to be around late April.  For students aiming to defend in January, expect early December.  The opponent will review your thesis and give you feedback.  Clearly, you will be allowed to continue working on your thesis, but keep in mind any results or insights that you produce during that time won&amp;#039;t be visible to your opponent.  You can and should, however, include them in the final copy of your thesis and defence presentation.  Expect that you should receive the review from your opponent about a week or two before the final deadline.  This will allow you to make minor modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15 minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15 min presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document. &amp;#039;&amp;#039;&amp;#039;The document must include your name, student number, and also the name of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor, if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for June defences, and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enroll yourself in that link.  Instructions on how to access the TTU Moodle can be found [https://courses.cs.ttu.ee/pages/Instructions_for_accessing_ained.ttu.ee here]. Feedback on the problem statement and research design document should be received within 3-4 weeks via TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include very brief answers to below questions in two or three pages.&lt;br /&gt;
&lt;br /&gt;
• What is the research problem/hypothesis/question?&lt;br /&gt;
&lt;br /&gt;
• What are the goals of the study?&lt;br /&gt;
&lt;br /&gt;
• Why is this study important?&lt;br /&gt;
&lt;br /&gt;
• What are the possible outcomes of the study?&lt;br /&gt;
&lt;br /&gt;
• What are the limitations and key assumptions of the study?&lt;br /&gt;
&lt;br /&gt;
• What is missing in the literature?&lt;br /&gt;
&lt;br /&gt;
• Which methodologies will be used for solving the problem and validation of the study?&lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review 1-2 weeks before the final university deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisor must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical, organizational and strategic. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, intrusion detection in SCADA or IoT systems and extraction of cyber threat intelligence    &lt;br /&gt;
&lt;br /&gt;
* Cyber security of Industrial Control or IoT systems: Development of a security testbed, honeypots, intrusion detection systems, digital forensics issues &lt;br /&gt;
&lt;br /&gt;
* Situational Awareness and Cyber Threat Intelligence: Impact of cyber threats on business processes, sophistication analysis of cyber attacks, cyber threat information sharing protocols, privacy preserved sharing of cyber threat intelligence &lt;br /&gt;
      &lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, or vulnerability management   &lt;br /&gt;
&lt;br /&gt;
Strategic Topics&lt;br /&gt;
&lt;br /&gt;
* High-level information flows and reporting mechanisms among the major entities of national cyber security governance structures&lt;br /&gt;
* Maturity models for the analysis of national cyber security capability&lt;br /&gt;
&lt;br /&gt;
==== From Bernhards Blumbergs ==== &lt;br /&gt;
* network security&lt;br /&gt;
* exploit development, &lt;br /&gt;
* advanced threats &lt;br /&gt;
* security evasion, &lt;br /&gt;
* IPv6&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
* Pilveteenuste ohuanalüüs ja võrdlus ISKE-ga&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Aleksandr Lenin, Cybernetica AS. ====&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* forensics&lt;br /&gt;
* malware &lt;br /&gt;
* anti-malware&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Mika Kerttunen, Tallinn University of Technology ====&lt;br /&gt;
* Mathematical modeling of critical infrastructure protection: priorities and decision-making&lt;br /&gt;
* From table-top to lap-top: The objectives, methods, and conduct of operational level cyber security exercises&lt;br /&gt;
* International attribution council &lt;br /&gt;
* Public-private partnerships&lt;br /&gt;
* Military cyber defence&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
No slots available anymore.  Accepting next students only who are working towards January &amp;#039;&amp;#039;&amp;#039;2020&amp;#039;&amp;#039;&amp;#039; (or later) defences.&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Arnis Paršovs, University of Tartu, arnis@ut.ee ====&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== Tiia Sõmer ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* log collection and analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* security monitoring &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Application for supervision requires passing the Cyber Defense Monitoring Solutions course with grade 4 or 5.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From the TUT IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.ttu.ee/faculties/school-of-information-technologies/it-studies/thesis-and-graduation-9/thesis-formatting-5/ Format requirements of a thesis (TTU)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Hayretdin</name></author>
	</entry>
</feed>