<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="et">
	<id>http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kristi</id>
	<title>Kursused - Kasutaja kaastöö [et]</title>
	<link rel="self" type="application/atom+xml" href="http://courses.cs.taltech.ee/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kristi"/>
	<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/pages/Eri:Kaast%C3%B6%C3%B6/Kristi"/>
	<updated>2026-05-21T20:01:11Z</updated>
	<subtitle>Kasutaja kaastöö</subtitle>
	<generator>MediaWiki 1.35.9</generator>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10343</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10343"/>
		<updated>2022-01-12T09:52:46Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
* GNSS jamming and spoofing of the unmanned vehicles&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10342</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10342"/>
		<updated>2022-01-12T09:52:35Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for January 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31426. There is no enrollment key for the students.&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
* GNSS jamming and spoofing of the unmanned vehicles&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10332</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10332"/>
		<updated>2022-01-03T16:34:26Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022 https://moodle.taltech.ee/course/view.php?id=31686, No enrolment key is needed for the students. &lt;br /&gt;
* Defences: 10 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31426. There is no enrollment key for the students.&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
* GNSS jamming and spoofing of the unmanned vehicles&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10330</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10330"/>
		<updated>2021-12-27T14:32:56Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for January 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022 https://moodle.taltech.ee/course/view.php?id=31686, No enrolment key is needed for the students. &lt;br /&gt;
* Defences: 10 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31426. There is no enrollment key for the students.&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10314</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10314"/>
		<updated>2021-12-03T12:28:23Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31686, No enrolment key is needed for the students. &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31426. There is no enrollment key for the students.&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 2-3 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10311</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10311"/>
		<updated>2021-12-02T13:54:38Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31686, No enrolment key is needed for the students. &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31426. There is no enrollment key for the students.&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 1-2 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10310</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10310"/>
		<updated>2021-12-02T13:53:52Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for January 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 &lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021 https://moodle.taltech.ee/course/view.php?id=31686, No enrolment key is needed for the students. &lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 1-2 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10309</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10309"/>
		<updated>2021-12-02T12:57:25Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021&lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021&lt;br /&gt;
* Submission of the thesis to the reviewer: 25 April 2022&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: 16 May 2022&lt;br /&gt;
* Defences: 30-31 May, 1-2 June 2022&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10240</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10240"/>
		<updated>2021-10-25T09:10:28Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021&lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: 9 May 2022&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10226</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10226"/>
		<updated>2021-10-12T15:20:08Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for May/June 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021&lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: 14 December 2021&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10225</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10225"/>
		<updated>2021-10-12T15:19:45Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Important Deadlines for January 2022 Defence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: 14 December 2021&lt;br /&gt;
* OIS declaration: 13 December 2021&lt;br /&gt;
* Submission of the final version of the thesis: 3 January 2022&lt;br /&gt;
* Defences: 10 - 11 January 2022&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10220</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10220"/>
		<updated>2021-10-06T12:31:46Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Potential supervisors &amp;amp; proposed topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas NATO CCDCOE ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10219</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10219"/>
		<updated>2021-10-06T12:28:51Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Potential supervisors &amp;amp; proposed topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10218</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10218"/>
		<updated>2021-10-06T12:26:09Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Potential supervisors &amp;amp; proposed topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10217</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10217"/>
		<updated>2021-10-06T06:59:32Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Potential supervisors &amp;amp; proposed topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Marko Arik, Industry PhD student, Talgen Cybersecurity Ltd. marko.arik@taltech.ee ====  &lt;br /&gt;
&lt;br /&gt;
* Cyber Operations&lt;br /&gt;
* Informational Environment&lt;br /&gt;
* Individual competences in Cyber&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10181</id>
		<title>Thesis</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Thesis&amp;diff=10181"/>
		<updated>2021-09-17T08:08:48Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Potential supervisors &amp;amp; proposed topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Thesis info for Cyber Security students=&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for January 2022 Defence ==&lt;br /&gt;
* Submission of problem statement and research design document: 15th August 2021 https://moodle.taltech.ee/course/view.php?id=31686, Student key: qv374MdM&lt;br /&gt;
&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
== Important Deadlines for May/June 2022 Defence ==&lt;br /&gt;
&lt;br /&gt;
* Submission of problem statement and research design document: TBD&lt;br /&gt;
* Submission of the thesis to the reviewer: TBD&lt;br /&gt;
* OIS declaration: TBD&lt;br /&gt;
* Submission of the final version of the thesis: TBD&lt;br /&gt;
* Defences: TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Thesis Defence Overview ==&lt;br /&gt;
&lt;br /&gt;
Writing and defending an MSc thesis is an important part of the Cyber Security curriculum, as it shows that you can go deep into a specific cyber security research area.  This page gives a rough overview of the process, but details should be discussed with your supervisor. This overview part is given according to the assumption that you are following a 4-semester study plan and aim to defend in the May period. If you want to defend in January, then you can adjust the planning phases accordingly.&lt;br /&gt;
&lt;br /&gt;
Generally, the process should start during the first year, by finding a topic-area of interest and by identifying a suitable supervisor. At the end of the second semester, it is highly recommended to have an idea about your topic and have discussed this with your supervisor.&lt;br /&gt;
&lt;br /&gt;
In early December, you should submit a problem statement and research design document (please, find the details, below). Sending this document is considered as a registration to the defence that will take place in next term.   &lt;br /&gt;
&lt;br /&gt;
The next step in the process would be conducting the research.  As the thesis submission deadline is around the third week of April (for students aiming to defend in January, this deadline is early December), please, plan to finish your work early April, so that your supervisor can review your thesis, give you feedback and you have time to address the feedback before your thesis is being sent to the reviewer/opponent.  Jointly with your supervisor, you should then make a decision if your work is ready to be submitted for May defence (or if you need more time and prefer to submit for a January defence). The reviewer will review your thesis and give you feedback. Expect that you should receive the review about a week before the final deadline. You can continue to update your work until the final submission date. You can and should, however, incorporate the review feedback into the final copy of your thesis and defence presentation.    This will allow you to make modifications, e.g., fix some typos or clarify some sections, which the reviewer pointed out.&lt;br /&gt;
&lt;br /&gt;
At the final submission deadline, you will have to submit your thesis. On the day of defence, you are expected to give a 15-minute presentation of your work, followed by Q&amp;amp;A from the opponent, committee, supervisor &amp;amp; audience. Make sure you prepare your 15-minute presentation well, this should not be left for the evening before the defence. &lt;br /&gt;
&lt;br /&gt;
Below some more detailed information. &lt;br /&gt;
&lt;br /&gt;
Good luck!   &lt;br /&gt;
&lt;br /&gt;
=== Registration and submission of problem statement and research design document ===&lt;br /&gt;
Each student is required to submit a problem statement and research design document having a length up to 10 pages. &amp;#039;&amp;#039;&amp;#039;The document must include your name and also the names of thesis and supervisor&amp;#039;&amp;#039;&amp;#039; (and co-supervisor if exists).&lt;br /&gt;
&lt;br /&gt;
About half a year before the defence, the students are required to indicate their intent to defend by this document.  See deadlines above set for each semester. Typically this will be around Early December for May defences and Mid June for January defences.  You will need to submit this via the TTU Moodle link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. You&amp;#039;ll have to self-enrol yourself in that link.  Feedback on the problem statement and research design document should be received within 3-4 weeks via the email account that you defined in TTU Moodle.&lt;br /&gt;
  &lt;br /&gt;
The document should include the following sections and content:&lt;br /&gt;
&lt;br /&gt;
• The topic of the thesis&lt;br /&gt;
&lt;br /&gt;
• The name of the author&lt;br /&gt;
&lt;br /&gt;
• The name of the supervisor&lt;br /&gt;
&lt;br /&gt;
• Motivation: An overview of the addressed problem is given here. It should be explained why the problem is important and deserves a research study.&lt;br /&gt;
&lt;br /&gt;
• Research Problem/Hypothesis/Question: It is imperative to write a proper research problem/hypothesis/question statement(s).&lt;br /&gt;
&lt;br /&gt;
• Scope and Goal: This section defines the goal of the study and describes the main outcomes. It is required to specify the scope, limitations and key assumptions of the study.&lt;br /&gt;
&lt;br /&gt;
• Literature Review: This section includes the analysis of similar studies in the literature and gives a discussion of the research gap. It is important to link this research gap explanation with the research problem.&lt;br /&gt;
&lt;br /&gt;
• Novelty: This section justifies the novelty of your study, explains what the main contribution is and what the differences are when compared to similar studies.&lt;br /&gt;
 &lt;br /&gt;
• Research Methods: The research methods that you will apply in your study are given here. The data collection and analysis methods are also covered in this section. It is needed to explain how your research outcome will be validated.&lt;br /&gt;
 &lt;br /&gt;
• References: The resources referenced in the document are listed here.  &lt;br /&gt;
&lt;br /&gt;
This document is evaluated according to the following criteria:&lt;br /&gt;
&lt;br /&gt;
Whether the author&lt;br /&gt;
&lt;br /&gt;
• has a well-defined problem statement,&lt;br /&gt;
&lt;br /&gt;
• successfully presents the significance of the problem,&lt;br /&gt;
&lt;br /&gt;
• knows the literature and the limits of existing solutions,&lt;br /&gt;
&lt;br /&gt;
• have thought about possible methods,&lt;br /&gt;
&lt;br /&gt;
• have thought about how to validate the proposed solution,&lt;br /&gt;
&lt;br /&gt;
• brings a novelty to the literature.&lt;br /&gt;
&lt;br /&gt;
You can find detailed information about research methods [https://courses.cs.ttu.ee/pages/Research_Method here.]&lt;br /&gt;
&lt;br /&gt;
=== Submission to Reviewer ===&lt;br /&gt;
Each thesis will be assigned a reviewer or sometimes called opponent. The reviewer must have at least a Master&amp;#039;s degree and relevant knowledge or experience in the field of the thesis topic, and they must not have a conflict of interest (such as being members in the same research group). Students and supervisor may recommend reviewer candidates, but the final assignment will be done by the thesis defence committee. &lt;br /&gt;
&lt;br /&gt;
A reviewer will provide written feedback (typically about two pages) on the thesis. The review should cover the following points:&lt;br /&gt;
* short description of the thesis&lt;br /&gt;
* strengths and weaknesses of the thesis&lt;br /&gt;
* recommended grade (0-5, where 0 is a failing thesis and 5 is an excellent thesis) based on the clarity of the problem and the solution, complexity of the problem, suitability of the chosen solution, proper execution of the solution, and the proper formatting and language use in the thesis.&lt;br /&gt;
* at least three questions that can be asked during the defence.&lt;br /&gt;
&lt;br /&gt;
Based on the student&amp;#039;s performance at the defence the reviewer may change the recommended grade.&lt;br /&gt;
&lt;br /&gt;
The reviewer will receive a copy of the thesis about two-three weeks before the final/hard university deadline for submitting the thesis.  The reason for this is that typically reviewers point out the typos and small factual mistakes that can be fixed in short time (about a week).  The student will receive the review one week before the final submission deadline and therefore is able to address some of the comments before submitting the final version.  The student can also still decide not to submit the thesis this round, but rather work on improving the quality and then submit an improved version in the next defence period.&lt;br /&gt;
&lt;br /&gt;
=== OIS declaration===&lt;br /&gt;
Before a student can proceed to the thesis defence, they have to declare the thesis topic in OIS and get approval from their supervisor. Please pay careful attention to the OIS declaration deadline, as without this you will not be permitted to attend the defence. If you will defend your thesis in Tartu University, then you should do your OIS declaration to their systems according to their deadlines.&lt;br /&gt;
&lt;br /&gt;
=== Submission of Final Copy===&lt;br /&gt;
&lt;br /&gt;
Each student will submit the pdf version of the thesis, the relevant thesis metadata and licence information via moodle course page link given in &amp;quot;important deadlines&amp;quot; section of relevant defence period. Please complete the steps 1, 2 and 3 of the thesis submission on this page.  &lt;br /&gt;
&lt;br /&gt;
In addition to submission of above materials via Moodle, one paper copy of your thesis will be collected before defence, which you will get back after defence. The details will be announced one or two weeks before the deadline. &lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in Tartu University, then you should submit final copy according to the procedures and deadlines of Tartu University.   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
NB!  Do not forget that you need to prepare a &amp;#039;&amp;#039;&amp;#039;15 min presentation for your defence&amp;#039;&amp;#039;&amp;#039;.  This should really not be left to the evening before the defence!&lt;br /&gt;
&lt;br /&gt;
=== The defence procedure ===&lt;br /&gt;
On the day of defence, students will present their theses according to the announced schedule. Generally, the results will be announced at the end of the day.&lt;br /&gt;
&lt;br /&gt;
The defence procedure for each student consists of the following steps:&lt;br /&gt;
* the committee Chairman announces the name of the student, the topic of the thesis, and the names of the supervisor(s) and reviewer.&lt;br /&gt;
* the student presents his or her thesis in 15 minutes.&lt;br /&gt;
* the student answers the reviewer&amp;#039;s questions and the reviewer recommends a grade. This recommendation may differ from the preliminary recommendation, based on how successful the defence was.&lt;br /&gt;
* the student answers questions from the committee. &lt;br /&gt;
* the student answers questions from the audience.&lt;br /&gt;
* the supervisor gives his or her opinion of the thesis and recommends a grade.&lt;br /&gt;
&lt;br /&gt;
NB! The recommended grades by the reviewer and the supervisor are not binding to the committee, who makes the final decision.&lt;br /&gt;
&lt;br /&gt;
* After the thesis defence, please visit the Dean&amp;#039;s Office for more information about final formalities.&lt;br /&gt;
* [http://lab.cs.ttu.ee/theses Upload your thesis if you would like to have it public]&lt;br /&gt;
&lt;br /&gt;
== Formal Requirements and recommendations ==&lt;br /&gt;
&lt;br /&gt;
Until further notice, please use the formatting guide from the School of Information Technologies (link to the guide is given [https://www.taltech.ee/en/thesis-and-graduation-it#p43359 here]). Please note that you will have to change the title page as of 01.01.2017:&lt;br /&gt;
* write &amp;quot;School of Information Technology&amp;quot; instead of &amp;quot;Faculty of Information Technology&amp;quot;&lt;br /&gt;
* write &amp;quot;Department of Software Science&amp;quot; instead of &amp;quot;Department of Computer Engineering&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The thesis code for IVCM is ITC70LT.&lt;br /&gt;
&lt;br /&gt;
The following advices can be considered for a master thesis&lt;br /&gt;
* a title page, an author declaration, an annotation in English and Estonian, a list of contents, and references are required in the thesis&lt;br /&gt;
* 50-80 pages + appendices if needed&lt;br /&gt;
* Times New Roman (or similar), font size 12, 1.5 spacing used for the ordinary text&lt;br /&gt;
* Headings are numbered and no more than 3 levels used&lt;br /&gt;
* Don&amp;#039;t forget page numbers&lt;br /&gt;
&lt;br /&gt;
== Topic and supervisor ==&lt;br /&gt;
Every student must have a supervisor when writing the thesis. The supervisor&amp;#039;s role is to provide guidance on topic selection and research methods, as well as to give feedback on your work. It is not the supervisor&amp;#039;s duty to correct spelling mistakes or formatting errors - they may point such things out, but the responsibility remains with you. Before a thesis will be accepted for defence, the supervisor has to agree that it is of sufficient quality.&lt;br /&gt;
&lt;br /&gt;
Almost any professor and lecturer you have met in your curriculum can act as an supervisor of your thesis. Some of them have some open problems suitable for doing research and writing a thesis, but many may not have a topic to offer right away. It is usually more helpful to have an initial idea of a topic of your thesis and ask someone with interests in the related field to advise you. You can have a supervisor not related to the university, but he can act only as a co-supervisor and you need to agree to somebody related to the curricula or the [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/about-faculty-2/departments/department-of-computer-science-2/ leading institute] of the curriculum to be an official co-supervisor. All (co-)supervisors must have at least a Master&amp;#039;s degree.&lt;br /&gt;
&lt;br /&gt;
When refining a topic idea, make sure it has a clear connection with cyber security.&lt;br /&gt;
&lt;br /&gt;
NB!&lt;br /&gt;
Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager.&lt;br /&gt;
&lt;br /&gt;
If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
== Potential supervisors &amp;amp; proposed topics ==&lt;br /&gt;
 &lt;br /&gt;
The topics below are offered by potential (co-)supervisors (in alphabetical order). The list is updated as new offers emerge.&lt;br /&gt;
&lt;br /&gt;
==== From Hayretdin Bahsi, Tallinn University of Technology, hayretdin.bahsi@taltech.ee ====&lt;br /&gt;
&lt;br /&gt;
I am interested in various topics which can be categorized as technical and organizational. If you already have specific topics in your mind, we can discuss them and decide to work together.  &lt;br /&gt;
&lt;br /&gt;
Technical Topics&lt;br /&gt;
&lt;br /&gt;
* Application of machine learning and data mining methods to the following cyber security problems: Malware detection, botnet identification, code security review, intrusion detection in cyber-physical systems, IoT network or robotic systems    &lt;br /&gt;
* Cyber security of IoT, cyber-physical systems: Development of a security testbed, threat modelling, honeypots, intrusion detection systems&lt;br /&gt;
* Digital Forensics: Forensics issues in cyber-physical systems, IoT networks or robotics systems, mobile forensics, blockchain forensics&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Organizational Topics&lt;br /&gt;
&lt;br /&gt;
* Security operation center (SOC) models&lt;br /&gt;
* Case studies for the improvement of SOC processes such as threat monitoring, incident handling, vulnerability management or situational awareness&lt;br /&gt;
&lt;br /&gt;
==== From Aivo Kalu, Cybernetica AS ====&lt;br /&gt;
&lt;br /&gt;
1. Comparison of identity/authentication/signing APIs from security and architecture viewpoint&lt;br /&gt;
&lt;br /&gt;
This might be suitable for student, who is more interested about software developing/architecture aspects, but still related to security as well. In short, there are many competing API-s in the Baltic/Nordic region, which are used in practice, to request the authentication or signatures. For example: &lt;br /&gt;
&lt;br /&gt;
* https://github.com/SK-EID/smart-id-documentation/blob/master/README.md&lt;br /&gt;
* https://github.com/SK-EID/MID&lt;br /&gt;
* https://developers.dokobit.com&lt;br /&gt;
* https://developer.signicat.com/apis/sign-api/sign-api-v1/&lt;br /&gt;
* https://github.com/open-eid/SiGa/wiki/Hashcode-API-description&lt;br /&gt;
&lt;br /&gt;
and also, there are the “canonical” or “standard&amp;quot; ones like OIDC and SAML and DSS (http://docs.oasis-open.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.html). Which one is good? Which one has the best properties from software point of view or security point of view? Which one to use for future integrations? How do we even compare them?&lt;br /&gt;
&lt;br /&gt;
2. Apply Smart-ID authentication and digital signatures (or underlying SplitKey technology) in novel bitcoin/blockchain/SSI/DID use cases.&lt;br /&gt;
&lt;br /&gt;
For example, last year, there was the master thesis https://www.semanticscholar.org/paper/Aleksandr-Ts%C3%B5ganov-Integrating-User-Identity-with-Ts%C3%B5ganov-Pintado/30c653214f5a30ed46343058039d4b53a8d326f9?utm_source=email. &lt;br /&gt;
&lt;br /&gt;
If there’s some additional ideas, about where to apply the Smart-ID authentication services or perhaps to do more deeper integration with the SplitKey technology, we could discuss and see, if some interesting project might come out of this. &lt;br /&gt;
&lt;br /&gt;
3. Compare the attack model of the FIDO with the attack model of Smart-ID. &lt;br /&gt;
&lt;br /&gt;
The current Smart-ID authentication API (https://github.com/SK-EID/smart-id-documentation/blob/master/README.md) specifies how the anonymous session with the web-site becomes the authenticated session. Compare the security properties of this authentication flow with https://www.w3.org/TR/webauthn-2/ and https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-security-ref-v2.0-id-20180227.html&lt;br /&gt;
&lt;br /&gt;
4. Compare the properties of Smart-ID with framework by Bonneau et al.&lt;br /&gt;
&lt;br /&gt;
Take the https://www.cl.cam.ac.uk/~fms27/papers/2012-BonneauHerOorSta-password--oakland.pdf and the properties described there and analyse, which ones are satisfied by Smart-ID, which ones are not satisfied, which ones are already pointless in the year 2020. Compare with http://fc16.ifca.ai/preproceedings/25_Lang.pdf, which does the same kind exercise for FIDO in the section 6.1.&lt;br /&gt;
&lt;br /&gt;
==== From Jüri Kivimaa, Tallinn University of Technology ====&lt;br /&gt;
* IT security economics&lt;br /&gt;
* security cost optimization&lt;br /&gt;
&lt;br /&gt;
==== From Toomas Lepik, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
toomas.lepik@taltech.ee&lt;br /&gt;
&lt;br /&gt;
General areas:&lt;br /&gt;
&lt;br /&gt;
* Network Forensic (related data analysis)&lt;br /&gt;
* Reverse engineering (including malware analysis)&lt;br /&gt;
* SCADA security &lt;br /&gt;
* Incident Handling.&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Thesis/tl/  A bit more specific research ideas ]&lt;br /&gt;
&lt;br /&gt;
==== From Adrian Venables, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Cyber security aspects of Information Warfare&lt;br /&gt;
* Information Advantage doctrine development&lt;br /&gt;
* Influence Operations&lt;br /&gt;
&lt;br /&gt;
Note: a background in International Relations, Political Science or Strategic Studies is required&lt;br /&gt;
&lt;br /&gt;
==== From Sten Mäses, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* Creating educational hands-on virtual labs in rangeforce.com platform&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== From Birgy Lorenz, Tallinn University of Technology ====&lt;br /&gt;
birgy.lorenz@ttu.ee&lt;br /&gt;
&lt;br /&gt;
* human factors in cybersecurity&lt;br /&gt;
* cyber awareness and training (kindergarten, schools, laypersons)&lt;br /&gt;
* cybersecurity young talents skills and its development and testing&lt;br /&gt;
* women in cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From [https://maennel.net Olaf Maennel], Tallinn University of Technology, olaf.maennel@ttu.ee ====&lt;br /&gt;
&lt;br /&gt;
* Network security &amp;amp; network measurements (active &amp;amp; passive)&lt;br /&gt;
* WAN-routing &amp;amp; security (IPv6, BGP/BGPsec,...)&lt;br /&gt;
&lt;br /&gt;
==== From Andrew Roberts, Tallinn University of Technology ====&lt;br /&gt;
Topics: &lt;br /&gt;
1.	Evaluation of Methods for Threat and Risk Assessment of Autonomous Self-Driving Vehicles&lt;br /&gt;
2.	Design and Development of a cyber range for Autonomous self-driving vehicles &lt;br /&gt;
Contribution: &lt;br /&gt;
&lt;br /&gt;
Topic 1: The outcome of this work will form part of TUT contribution to standards and methods research within the International Alliance for Mobility Testing and Standardisation (IAMTS). &lt;br /&gt;
&lt;br /&gt;
Topic 2: The developed cyber range will be integrated into the EU ECHO-Federated Cyber Range.&lt;br /&gt;
&lt;br /&gt;
==== From Anna-Maria Osula, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* legal aspects of cyber security &lt;br /&gt;
* international law&lt;br /&gt;
&lt;br /&gt;
==== From Rain Ottis, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* national cyber security&lt;br /&gt;
* serious games in cyber security/cyber security exercises&lt;br /&gt;
&lt;br /&gt;
==== From Mauno Pihelgas ==== &lt;br /&gt;
* system monitoring&lt;br /&gt;
* network monitoring&lt;br /&gt;
* IDS/IPS systems&lt;br /&gt;
* insider threat detection&lt;br /&gt;
&lt;br /&gt;
==== From Jaan Priisalu, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
* TBD&lt;br /&gt;
&lt;br /&gt;
==== From Tiia Sõmer, Tallinn University of Technology ==== &lt;br /&gt;
&lt;br /&gt;
Currently no topics on offer.&lt;br /&gt;
&lt;br /&gt;
==== From Kaie Maennel, Tallinn University of Technology ====&lt;br /&gt;
(kaie.maennel@ttu.ee)&lt;br /&gt;
&lt;br /&gt;
- cyber awareness and hygiene&lt;br /&gt;
&lt;br /&gt;
- cyber security learning and teaching (e.g., serious games, cyber defense exercises, etc.)&lt;br /&gt;
&lt;br /&gt;
- learning analytics in cyber security training context&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cybersecurity risk assessment and management&lt;br /&gt;
&lt;br /&gt;
- IT and cybersecurity audits&lt;br /&gt;
&lt;br /&gt;
==== From Stefan Sütterlin, Tallinn University of Technology &amp;amp; Østfold University College ====&lt;br /&gt;
(stefan.sutterlin@hiof.no)&lt;br /&gt;
&lt;br /&gt;
- cognitive science and performance in cyber defence&lt;br /&gt;
&lt;br /&gt;
- human factors in cyber security&lt;br /&gt;
&lt;br /&gt;
- cyberpsychology&lt;br /&gt;
&lt;br /&gt;
- decision-making&lt;br /&gt;
&lt;br /&gt;
- cognitive biases &lt;br /&gt;
&lt;br /&gt;
- cybersecurity awareness&lt;br /&gt;
&lt;br /&gt;
==== From Eneken Tikk, Tallinn University of Technology ====&lt;br /&gt;
* Technical and organizational implementation of the GDPR &lt;br /&gt;
* Monetization of personal data &lt;br /&gt;
* Economics of cybersecurity (the cost of implementation relative to the anticipated and evidenced gains) &lt;br /&gt;
* Cyber insurance&lt;br /&gt;
* Non-military strategies for national and international cybersecurity&lt;br /&gt;
* Legal aspects of cybersecurity&lt;br /&gt;
&lt;br /&gt;
==== From Risto Vaarandi, Tallinn University of Technology ====&lt;br /&gt;
&lt;br /&gt;
Here are potential areas for selecting a thesis topic:&lt;br /&gt;
&lt;br /&gt;
* event log collection&lt;br /&gt;
* event log analysis&lt;br /&gt;
* event correlation&lt;br /&gt;
* network monitoring&lt;br /&gt;
* intrusion detection&lt;br /&gt;
* any area that is connected to security monitoring&lt;br /&gt;
* various other system security engineering topics (for example, system hardening or firewalling)&lt;br /&gt;
&lt;br /&gt;
When applying for supervision, preference is given to students who have either passed the Cyber Defense Monitoring Solutions course with grade 4 or 5, or have previous engineering experience in the research area (for example, writing a thesis on network intrusion detection requires previous experience with network IDS systems). Before applying, make sure you have selected at least one initial thesis topic suggestion with a background research about its validity.&lt;br /&gt;
&lt;br /&gt;
==== From Shaymaa Khalil, TalTech ====&lt;br /&gt;
&lt;br /&gt;
Interested in (but not limited to) topics related to:&lt;br /&gt;
 &lt;br /&gt;
Industrial control systems: threat modeling, security, threat detection, testbeds, and education programs&lt;br /&gt;
&lt;br /&gt;
Digital Forensics topics, especially topics related to Industrial control systems, Windows OS and Digital Forensics tools benchmarking&lt;br /&gt;
&lt;br /&gt;
==== From Gabor Visky, NATO  CCDCOE / TalTech ====&lt;br /&gt;
&lt;br /&gt;
Gabor Visky &amp;lt;gabor.visky@ccdcoe.org&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Network traffic analysis in the maritime cyber-lab&lt;br /&gt;
&lt;br /&gt;
==== From Matthew Sorell, Tallinn University of Technology / Adelaide University Australia ====&lt;br /&gt;
&lt;br /&gt;
Matthew James Sorell &amp;lt;matthew.sorell@taltech.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. A risk-based decision approach for handling digital devices at a crime scene.&lt;br /&gt;
&lt;br /&gt;
It is common for electronic devices such as mobile phones to be discovered at a crime scene, but the means for securing the device is becoming increasingly complex. In spite of this, evidence handling procedures are often static and increasingly out of date, leading to the loss of critical evidence in serious crime.&lt;br /&gt;
&lt;br /&gt;
The phone may be remotely wiped; picking it up may activate motion sensors; and in some cases (such as missing persons) the urgency of the evidence needs to be weighed against securing forensic evidence for investigation and prosecution. &lt;br /&gt;
&lt;br /&gt;
In this research, we consider the development of a risk-based approach to advising crime scene investigators to handle digital devices in the least-worst way.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Feasible route mapping&lt;br /&gt;
&lt;br /&gt;
When examining timestamped geolocation data, it is often useful to determine feasible routes which could be taken from one location to another. &lt;br /&gt;
&lt;br /&gt;
Google Maps, for example, provides directions and sometimes provides a small number of alternatives. For criminal investigation, a heatmap of feasible routes would support investigators with a means to rapidly evaluate the context of movement in and around a crime. &lt;br /&gt;
&lt;br /&gt;
In this project, we propose to use the Google Maps Platform (https://developers.google.com/maps/gmp-get-started) to build, through statistical sampling, a heatmap of feasible routes subject to time and modes-of-transportation constraints.&lt;br /&gt;
&lt;br /&gt;
==== From the TalTech IT office ====&lt;br /&gt;
Infrastructure&lt;br /&gt;
* Migrating TUT Campus LAN to IPv6; Edgars Zigurs&lt;br /&gt;
* Implementing a freeware SIEM solution in TUT; Edgars Zigurs&lt;br /&gt;
* Campus WiFi quality and signal strength modeling (3D); Edgars Zigurs&lt;br /&gt;
&lt;br /&gt;
Development&lt;br /&gt;
* electronic door signs, room calendars, etc.; Thomas Lepik&lt;br /&gt;
* VoIP solutions - softphone, integration with existing information systems; Thomas Lepik&lt;br /&gt;
* integrating last generation BMS (Building Management System); Thomas Lepik&lt;br /&gt;
* the student view of OIS (usability, security, re-design); Enn Rebane&lt;br /&gt;
&lt;br /&gt;
==== From the Tartu University thesis topic registry ====&lt;br /&gt;
NB! Theses supervised by supervisors from the University of Tartu (UT) have to be defended in UT. Exceptions are possible, but need do be approved by the program manager. If you will defend your thesis in UT, then you should do your thesis declaration according to the procedures and deadlines of UT. Thesis related guidelines and regulations are available at: https://www.cs.ut.ee/en/studying/guidelines-regulations&lt;br /&gt;
In case of any questions contact UT Institute of Computer Science Academic Affairs Specialist Maarja Kungla (maarja.kungla@ut.ee).&lt;br /&gt;
&lt;br /&gt;
- Arnis Paršovs, University of Tartu, arnis@ut.ee&lt;br /&gt;
* eID&lt;br /&gt;
* PKI&lt;br /&gt;
* TLS&lt;br /&gt;
* Smart cards&lt;br /&gt;
&lt;br /&gt;
A full list of thesis topics offered by the [https://acs.cs.ut.ee/ Applied Cyber Security Group (UT)] is available in the [https://comserv.cs.ut.ee/ati_thesis_offers/index.php?year=all&amp;amp;keywords=acs thesis topics database].&lt;br /&gt;
&lt;br /&gt;
Students can also get access to various [https://acs.cs.ut.ee/hardware/ hardware] that can be used for research experiments.&lt;br /&gt;
&lt;br /&gt;
- Dominique Unruh, University of Tartu, &amp;lt;dominique.unruh@ut.ee&amp;gt; &lt;br /&gt;
&lt;br /&gt;
- Vitaly Skachek, University of Tartu, &amp;lt;vitaly.skachek@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Meelis Roos, University of Tartu, &amp;lt;meelis.roos@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mubashar Iqbal, University of Tartu, &amp;lt;mubashar.iqbal@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Abasi-Amefon Obot Affia, University of Tartu, &amp;lt;amefon.affia@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Mari Seeba, University of Tartu, &amp;lt;mari.seeba@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
- Sabah Suhail, University of Tartu,&lt;br /&gt;
&lt;br /&gt;
- Raimundas Matulevicius, University of Tartu, &amp;lt;raimundas.matulevicius@ut.ee&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some topics are provided at &amp;lt;https://infosec.cs.ut.ee/Main/ThesisTopics&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For other topics, students can contact directly the supervisors and course lecturers.&lt;br /&gt;
&lt;br /&gt;
==== From Estonian Police ====&lt;br /&gt;
* Vaatlustarkvarade EnCase ja Autopsy võrdlus (selgituseks, et Autopsy on EnCase analoog, kuid tasuta. Vajalik oleks täpne analüüs, et mida Autopsy võimaldab ja mida mitte võrreldes EnCase ja/või FTKga).&lt;br /&gt;
&lt;br /&gt;
* Erinevate suhtlustarkvarade (WhatsApp, Viber, FB Messenger, Skype jt) jäljed mobiiltelefonides ja nende analüüsimine (selgituseks, et üldjuhul loovad suhtlustarkvarad mingi andmebaasi vestlustega ka telefoni, kas see on krüpteeritud või mitte? Osad vestlused XRY tuvastab, aga millistel juhtudel? Millised võimalused oleks neid faile nö käsitsi uurida?).&lt;br /&gt;
&lt;br /&gt;
* Tõendiahela kirjeldamine elektrooniliste tõendite fikseerimisel (chain of custody)/Elektroonilise sisu erikohtlemine asitõendi vaatlusel/Digitaaltõendite vaatluse kord – erinevate riikid analüüs ja võrdlus.&lt;br /&gt;
&lt;br /&gt;
* P2P võrkudes lastest ebasündsate piltide levitajate tuvastamine/P2P võrkudes illegaalse internetisisu levitajate tuvastamine.&lt;br /&gt;
&lt;br /&gt;
* Koolituskava väljatöötamine uurijale/menetlejale, kes puutub kokku digitaalsete tõenditega- erinevate riikide praktika võrdlus.&lt;br /&gt;
&lt;br /&gt;
* Ask Rain Ottis for a POC on these topics.&lt;br /&gt;
&lt;br /&gt;
== Useful links ==&lt;br /&gt;
[https://drive.google.com/file/d/0B7yq33Gize8ydEh5X0NxeWtZc3c/edit ITX8040 Thesis advice slides]&lt;br /&gt;
&lt;br /&gt;
[https://www.taltech.ee/en/thesis-and-graduation-it#p43359 Format requirements of a thesis and MS-Word Template (TalTech)]&lt;br /&gt;
&lt;br /&gt;
[https://gitlab.cs.ttu.ee/templates/phd-thesis LATEX template for master thesis (TalTech) (accessible by UNI-ID)]&lt;br /&gt;
&lt;br /&gt;
[http://www.lib.ttu.ee/dbs/abaasid.asp Databases, books, research papers accessible from the TTU network]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Research_Method An Overview of Research Methods]&lt;br /&gt;
&lt;br /&gt;
[https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Previously Defended Theses]&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7903</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7903"/>
		<updated>2018-12-17T10:40:12Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [https://wiki.maennel.net/index.php?title=Main_Page Adelaide Research Bootcamp 2019] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/studies-30/interdisciplinary-cyber-research-icr-workshop/icr2019-3/ HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7809</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7809"/>
		<updated>2018-11-29T10:17:43Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/studies-30/interdisciplinary-cyber-research-icr-workshop/icr2019-3/ HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7805</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7805"/>
		<updated>2018-11-28T13:07:21Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/studies-30/interdisciplinary-cyber-research-icr-workshop/icr2019-3/ HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7804</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7804"/>
		<updated>2018-11-28T13:07:07Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/studies-30/interdisciplinary-cyber-research-icr-workshop/icr2019-3/ HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7789</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7789"/>
		<updated>2018-11-26T10:33:37Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/studies-30/interdisciplinary-cyber-research-icr-workshop/icr2019-3/ HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7788</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7788"/>
		<updated>2018-11-26T10:30:54Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/studies-30/interdisciplinary-cyber-research-icr-workshop/ HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7787</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7787"/>
		<updated>2018-11-26T10:30:00Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE] [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7786</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7786"/>
		<updated>2018-11-26T10:29:01Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]. [[Media:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7782</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7782"/>
		<updated>2018-11-22T13:08:45Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in Adelaide, Australia hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
==General advice==&lt;br /&gt;
Note that Australia has different power plugs [https://www.tripadvisor.co.uk/Travel-g255055-c120179/Australia:Power.And.Appliances.html/ Aussie plug] than Europe. Make sure you have or buy a converter for your laptop.&lt;br /&gt;
&lt;br /&gt;
You will also be expected to bring your own laptop/tablet for your work.&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7776</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7776"/>
		<updated>2018-11-22T09:27:07Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Objective */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in Adelaide, Australia hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 24 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
==General advice==&lt;br /&gt;
Note that Australia has different power plugs [https://www.tripadvisor.co.uk/Travel-g255055-c120179/Australia:Power.And.Appliances.html/ Aussie plug] than Europe. Make sure you have or buy a converter for your laptop.&lt;br /&gt;
&lt;br /&gt;
You will also be expected to bring your own laptop/tablet for your work.&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7775</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7775"/>
		<updated>2018-11-22T09:26:57Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Objective */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in Adelaide hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 24 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
==General advice==&lt;br /&gt;
Note that Australia has different power plugs [https://www.tripadvisor.co.uk/Travel-g255055-c120179/Australia:Power.And.Appliances.html/ Aussie plug] than Europe. Make sure you have or buy a converter for your laptop.&lt;br /&gt;
&lt;br /&gt;
You will also be expected to bring your own laptop/tablet for your work.&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7774</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7774"/>
		<updated>2018-11-22T08:49:26Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Objective */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in January 2018 in Adelaide hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 24 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
==General advice==&lt;br /&gt;
Note that Australia has different power plugs [https://www.tripadvisor.co.uk/Travel-g255055-c120179/Australia:Power.And.Appliances.html/ Aussie plug] than Europe. Make sure you have or buy a converter for your laptop.&lt;br /&gt;
&lt;br /&gt;
You will also be expected to bring your own laptop/tablet for your work.&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7773</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7773"/>
		<updated>2018-11-22T08:48:31Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* General advice */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in January 2018 in Adelaide hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 24 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
==General advice==&lt;br /&gt;
Note that Australia has different power plugs [https://www.tripadvisor.co.uk/Travel-g255055-c120179/Australia:Power.And.Appliances.html/ Aussie plug] than Europe. Make sure you have or buy a converter for your laptop.&lt;br /&gt;
&lt;br /&gt;
You will also be expected to bring your own laptop/tablet for your work.&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7772</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7772"/>
		<updated>2018-11-22T08:47:26Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Practical */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in January 2018 in Adelaide hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 24 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
==General advice==&lt;br /&gt;
Note that Australia has different power plugs [Aussie-plug / https://www.tripadvisor.co.uk/Travel-g255055-c120179/Australia:Power.And.Appliances.html] than Europe. Make sure you have or buy a converter for your laptop.&lt;br /&gt;
&lt;br /&gt;
You will also be expected to bring your own laptop/tablet for your work.&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7769</id>
		<title>Adelaide Research Bootcamp 2019</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Adelaide_Research_Bootcamp_2019&amp;diff=7769"/>
		<updated>2018-11-22T08:44:46Z</updated>

		<summary type="html">&lt;p&gt;Kristi: Uus lehekülg: &amp;#039;=Introduction= ==Objective== This is a two-week face-to-face meeting in January 2018 in Adelaide hosted by University of Adelaide. During that time small international teams of s...&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
==Objective==&lt;br /&gt;
This is a two-week face-to-face meeting in January 2018 in Adelaide hosted by University of Adelaide. During that time small international teams of students, with common research interests, will form. The purpose of those small groups is to have someone to actively discuss the research problem with — besides the mentors.&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
==Schedule==&lt;br /&gt;
Bootcamp will take place &amp;#039;&amp;#039;&amp;#039;14 - 24 January 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Detailed schedule TBD&lt;br /&gt;
&lt;br /&gt;
=Practical=&lt;br /&gt;
==Travel==&lt;br /&gt;
&lt;br /&gt;
==Accommodation==&lt;br /&gt;
&lt;br /&gt;
==Visa==&lt;br /&gt;
To find out whether a visa is needed for your trip to Australia, please check at&lt;br /&gt;
* [https://www.homeaffairs.gov.au/ https://www.homeaffairs.gov.au/]&lt;br /&gt;
* In most cases a tourist visa is sufficient.&lt;br /&gt;
* Please read the instructions on the visas carefully.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Contacts=&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7768</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7768"/>
		<updated>2018-11-22T08:35:17Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7767</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7767"/>
		<updated>2018-11-22T08:22:08Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* [[Adelaide Research Bootcamp 2019]] &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional). &lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7766</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7766"/>
		<updated>2018-11-22T08:07:51Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional). &lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7724</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7724"/>
		<updated>2018-11-09T12:17:25Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu (optional)&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7723</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7723"/>
		<updated>2018-11-09T12:13:40Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. List of required documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7722</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7722"/>
		<updated>2018-11-09T12:13:24Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. Documents and more information: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7721</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7721"/>
		<updated>2018-11-09T12:11:51Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
* In case you want to apply for the scholarship for participating at the Research Bootcamp at the University of Adelaide, please submit all required documents electronically or on paper to Dora Plus Action 1 Coordinator Kaire Kaljuvee: kaire.kaljuvee[at]taltech.ee by &amp;#039;&amp;#039;&amp;#039;7 December 2018&amp;#039;&amp;#039;&amp;#039; at the latest. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7720</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7720"/>
		<updated>2018-11-09T12:05:05Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7719</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7719"/>
		<updated>2018-11-09T12:04:39Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term Study Mobility Measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7718</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7718"/>
		<updated>2018-11-09T12:04:15Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship from Dora Plus Short-Term study mobility measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7717</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7717"/>
		<updated>2018-11-09T12:03:15Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you will be working closely together with mentors and you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but a wonderful opportunity and we highly recommend. For travel support, it is possible to apply for the scholarship for Dora Plus Short-Term study mobility measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7716</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7716"/>
		<updated>2018-11-09T12:01:13Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory but still a wonderful opportunity. For travel support, it is possible to apply for the scholarship for Dora Plus Short-Term study mobility measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7715</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7715"/>
		<updated>2018-11-09T12:00:25Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory. However, for travel support, it is possible to apply for the scholarship for Dora Plus Short-Term study mobility measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7714</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7714"/>
		<updated>2018-11-09T11:59:40Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory. For travel support, it is possible to apply for the scholarship for Dora Plus Short-Term study mobility measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7713</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7713"/>
		<updated>2018-11-09T11:59:25Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well. Participation at the Research Bootcamp is not mandatory. For travel support, it is possible to apply for the scholarship for Dora Plus Short-Term study mobility measure. Read more about the scholarship: [[https://www.ttu.ee/studying/phd-studies/programmes-6/dora-scholarships/ | HERE]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7712</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7712"/>
		<updated>2018-11-09T11:54:50Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* Timeline */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide. Over the two weeks, you should find other participants interested in your research, ideally working in related areas, willing to support you over the year. Obviously, you should be willing to support them as well.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7711</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7711"/>
		<updated>2018-11-09T11:52:17Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039; (mandatory)&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7710</id>
		<title>Cyber security research excellence course</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber_security_research_excellence_course&amp;diff=7710"/>
		<updated>2018-11-09T11:51:40Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* In 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
==Objective==&lt;br /&gt;
&lt;br /&gt;
The objective of the Cyber Security Research Excellence Course is to strengthen Estonia&amp;#039;s position on international cyber security research excellence. The main purpose is to give our cyber security students a unique experience in academic research, working on industry-related projects, academic writing, and presenting the work to an international audience. This builds the basis for establishing long-term collaborations on an international level. The starting point for this will be working on some concrete projects in cyber security that build the basis for a MSc thesis, an academic career or industry collaboration.&lt;br /&gt;
&lt;br /&gt;
==Outcome==&lt;br /&gt;
&lt;br /&gt;
The students will write a paper to be published at a conference or in a journal on original research done over the year. They will gain experience in conducting research and academic writing, build international long-term collaborations with students and supervisors at TalTech University as well as the partner universities.&lt;br /&gt;
&lt;br /&gt;
==Partners==&lt;br /&gt;
&lt;br /&gt;
This course will take place in collaboration between three universities:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;TalTech University&amp;#039;&amp;#039;&amp;#039; (Estonia) [https://en.wikipedia.org/wiki/Tallinn_University_of_Technology]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Adelaide&amp;#039;&amp;#039;&amp;#039; (Australia) [https://en.wikipedia.org/wiki/University_of_Adelaide]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;University of Applied Sciences Ravensburg-Weingarten&amp;#039;&amp;#039;&amp;#039; (Germany) [https://en.wikipedia.org/wiki/University_of_Applied_Sciences_Ravensburg-Weingarten]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We cooperate with the following industry partners:&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tallink&amp;#039;&amp;#039;&amp;#039; - the largest passenger and cargo shipping company in the Baltic Sea region [https://en.wikipedia.org/wiki/Tallink]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Avira Operations GmbH &amp;amp; Co.&amp;#039;&amp;#039;&amp;#039; - Avira is German antivirus company offering security solutions against malware, viruses and spyware [https://en.wikipedia.org/wiki/Avira]&lt;br /&gt;
&lt;br /&gt;
=Organisation=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
&lt;br /&gt;
It is expected from the students that they will actively &amp;quot;drive&amp;quot; the course, set their own milestones and be responsible for their progress. Throughout the course the students will be constantly mentored on a one-to-one basis. Furthermore, the students can get help from mentors participating in this collaboration, which currently includes academics working at the University of Adelaide, TalTech University and University of Applied Sciences Ravensburg-Weingarten.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2018&amp;#039;&amp;#039;&amp;#039; Getting acquainted with the course&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;November - December 2018&amp;#039;&amp;#039;&amp;#039; Signing up for the course, selecting the topic area, starting a literature review&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at Research Bootcamp at the University of Adelaide&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;February - May 2019&amp;#039;&amp;#039;&amp;#039; Regular meetings with the supervisors. During the spring, the students will meet with the supervisors regularly and discusses progress and questions arising from the work. This also includes discussions on topics such as &amp;#039;how to conduct a literature review&amp;#039;, &amp;#039;research methodology&amp;#039;, &amp;#039;how to select a conference or journal&amp;#039;, etc. Also submitting a 1,000 word research abstract and initial findings to the ICR2019: 5th Interdisciplinary Cyber Research workshop. Submission of abstract is mandatory&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June 2019&amp;#039;&amp;#039;&amp;#039; Attend at ICR2019 and present (if accepted) ongoing research at the workshop&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;July 2019&amp;#039;&amp;#039;&amp;#039; Option to participate at the Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography”  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Autumn 2019&amp;#039;&amp;#039;&amp;#039;	In the second half of the year we will more focus on analysing data, writing-up a paper using latex, etc&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;October 2019&amp;#039;&amp;#039;&amp;#039; Poster presenting research methodology, and results&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January 2020&amp;#039;&amp;#039;&amp;#039; Research paper draft ready to submit to journal or conference&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that semester at University of Tartu will not affect the eligibility for taking this course.&lt;br /&gt;
&lt;br /&gt;
==Research topics==&lt;br /&gt;
&lt;br /&gt;
Students are welcome to propose their own topics, or work with a supervisor on a per-defined topic.  An initial list of per-defined  projects include (list will be expanded over time):&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Application of Machine Learning to the Cyber Security Problems&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will apply machine learning algorithms to solve a cyber security problem which is mainly detecting a cyber attack in the selected network environment. There exist various publicly available datasets that include legitimate and attack records obtained from enterprise networks, SCADA systems, IoT networks, mobile systems. The student will select a problem domain (such as internal threat, IoT botnet, mobile malware, SCADA attacks) and create machine learning classifiers that discriminate attack records from legitimate ones with high accuracy detection rates. &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing an IoT Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this project, the student(s) will establish a test setup that resembles a realistic IoT network. The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated  and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course and may enable us to deal with some research problems about cyber security exercises/games.   &lt;br /&gt;
 &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Establishing a SCADA Security Test Setup&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In this topic, the student(s) will create a test setup that includes physical/virtual components of SCADA networks.  The main goal is to launch the cyber attacks in the environment where the normal traffic is also simulated and create a dataset that can be used by the other researchers. This test setup can be also utilized in an attack-defence type of course. The further study can be conducted for understanding how to create a totally virtual system that can be easily replicated for cyber security exercises. One other interesting question could be the comparison of the degree of fidelity provided by the physically established system and totally virtual one.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Conducting a Study in the Area of Cyber Doctrine Development&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
On 14 June 2016 the defence ministers of NATO countries agreed to recognise cyberspace as a domain of warfare at that year’s Warsaw Summit. However, although now regarded as equal to operations on land, sea, air and space, cyber doctrine is still immature and developing. The production of coherent strategy is further hindered by a lack of alignment in a definition of cyberspace. In this topic, the student(s) will have an opportunity to study in this area. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Maritime Cyber Security&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
In collaboration with Tallink we offer several projects on cyber security aspects of smart bridges or smart passenger desks. This project builds knowledge in secure system design, and penetration testing, risk analysis.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects in collaboration with Avira Operations&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
Please find the complete list of project proposals here: [[Media:Avira-project-proposals.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==ECTS==&lt;br /&gt;
&lt;br /&gt;
The course is running through all 2019 and valued at 15 ECTS (6  ECTS for spring semester 2019, 6 ECTS for autumn semester 2019, 3 ECTS C3S Summer School).&lt;br /&gt;
&lt;br /&gt;
=Participants=&lt;br /&gt;
&lt;br /&gt;
==Target group==&lt;br /&gt;
&lt;br /&gt;
The course is targeted at Cyber Security MSc students, who have a strong interest in pursuing an academic career, conducting research, and publishing papers. Furthermore, we encourage  MSc students to participate in this course in order to understand the more academic perspective early on and then join our PhD program and thereby strengthens Estonia&amp;#039;s Cyber Security research.&lt;br /&gt;
&lt;br /&gt;
==Important dates and events==&lt;br /&gt;
&lt;br /&gt;
Please keep track of the following dates and deadlines:&lt;br /&gt;
&lt;br /&gt;
===In 2018===&lt;br /&gt;
&lt;br /&gt;
* Cyber Security Student Briefing on &amp;#039;&amp;#039;&amp;#039;5 November 2018&amp;#039;&amp;#039;&amp;#039; at 15:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;Auditorium U01-202 TalTech University main building&amp;#039;&amp;#039;&amp;#039; (Ehitajate tee 5). Official launch of the course, briefing, possible to meet organisers and mentors, Q&amp;amp;A. Find the agenda: [https://www.ttu.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/ HERE]&lt;br /&gt;
* Sign up for the course by &amp;#039;&amp;#039;&amp;#039;6 November 2018&amp;#039;&amp;#039;&amp;#039; at 23:59. &lt;br /&gt;
* Course eligibility will be determined based on interviews on &amp;#039;&amp;#039;&amp;#039;7 November 2018&amp;#039;&amp;#039;&amp;#039; For signing up for the course, please book an interview time: [https://doodle.com/poll/qyy7nskhxnp67xwu HERE] Interviews will take place in &amp;#039;&amp;#039;&amp;#039;TalTech University ICT building&amp;#039;&amp;#039;&amp;#039; (Akadeemia tee 15a) room &amp;#039;&amp;#039;&amp;#039;ICT-420&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* Option to participate at Cybersecurity University Industry Networking (CUIN) at Startup Week TLN on &amp;#039;&amp;#039;&amp;#039;21 November 2018&amp;#039;&amp;#039;&amp;#039; at 14:00 - 17:00. Venue: &amp;#039;&amp;#039;&amp;#039;TalTech Mektory&amp;#039;&amp;#039;&amp;#039; (Raja 15). CUIN is a cyber security industry and university networking event which will bring young researchers and practicing experts in the cyber domain closer to stimulate research and development collaboration between the University and Industry. More information about the event, agenda and registration [https://www.facebook.com/events/247219845956105/ HERE]&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
===In 2019===&lt;br /&gt;
* Research Bootcamp at the University of Adelaide &amp;#039;&amp;#039;&amp;#039;14 - 25 January 2019&amp;#039;&amp;#039;&amp;#039; (optional)&lt;br /&gt;
* Abstract submission deadline for ICR2019 &amp;#039;&amp;#039;&amp;#039;15 April 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* Notification if accepted for presenting at ICR2019 &amp;#039;&amp;#039;&amp;#039;6 May 2019&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* ICR2019: 5th Interdisciplinary Cyber Research workshop &amp;#039;&amp;#039;&amp;#039;29 June 2019&amp;#039;&amp;#039;&amp;#039; at TalTech. More information about the event: [https://taltech.ee/institutes/centre-for-digital-forensics-cyber-security/news-16/icr2019-2 HERE] &lt;br /&gt;
* Optional Cyber Security Summer School C3S2019 “Blockchain and Quantum Cryptography” &amp;#039;&amp;#039;&amp;#039;1 - 5 July 2019&amp;#039;&amp;#039;&amp;#039; at University of Tartu&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;The list to be updated&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
=Administrative matters=&lt;br /&gt;
&lt;br /&gt;
==Contacts==&lt;br /&gt;
&lt;br /&gt;
* Kristi Ainen kristi.ainen[at]taltech.ee Project Manager at TalTech University, Administrative Support&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Olaf Maennel olaf.maenne[at]taltech.ee Professor of Cyber Security at TalTech University, Scientific Lead&lt;br /&gt;
&lt;br /&gt;
* Dr Matthew Sorell, University of Adelaide, Representing partner university, and Adjunct Professor in Digital Forensics at TalTech University&lt;br /&gt;
&lt;br /&gt;
* Prof. Dr Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten, Representing partner university&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Cyber&amp;diff=7663</id>
		<title>Cyber</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Cyber&amp;diff=7663"/>
		<updated>2018-11-06T10:00:35Z</updated>

		<summary type="html">&lt;p&gt;Kristi: /* News for Fall 2018 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Accomodation ==&lt;br /&gt;
&lt;br /&gt;
Campus information&lt;br /&gt;
&lt;br /&gt;
To find your way around the TalTech campus, please take a look at [https://www.ttu.ee/university/ttu-in-brief/ttu-campus/], there is also a map available there. &lt;br /&gt;
&lt;br /&gt;
Accommodation&lt;br /&gt;
&lt;br /&gt;
 The dormitory situation in TalTech is very tight, so please make sure you book your places well ahead. &lt;br /&gt;
&lt;br /&gt;
The information how to book a place at the dormitories can be found [http://www.ttu.ee/studying/new-and-current-student/accommodation-4/ here] &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;For new students&amp;#039;&amp;#039;&amp;#039;, please make sure you file your applications on the &amp;#039;&amp;#039;&amp;#039;1st of June!&amp;#039;&amp;#039;&amp;#039; The system opens on June 1st, and the sooner you apply the higher you are in the queue. You should not file it earlier either because then your application will end in a pile with all other students, and it takes longer. Student can choose only two houses on the application, so have a look at different dormitory buildings here:[https://www.ttu.ee/organizations/campus/student-residence/] Siidisaba building is located not in the campus, but in Kristiine area, which is closer to city centre, but away from university. Campus office will start giving out offers starting July 3. Have a look at the campus website: [https://www.ttu.ee/organizations/campus/applicant/first-year-international-students/] For students who plan to move after Autumn semester, November is about the latest time when to file an application with CampusTTU. Please note that students who have not stayed in TalTech dormitories can follow the link &amp;quot;Send application&amp;quot;. Students who have previously stayed at the dormitories need to follow the link &amp;quot;e-kyla login&amp;quot; and file the application from there. You can send yourself a password reminder from the page.&lt;br /&gt;
&lt;br /&gt;
== News for Fall 2018 ==&lt;br /&gt;
Rearranged with new items at the top.&lt;br /&gt;
* Slides from 5th of November student brief: [[Meedia:2018-11-05_student_brief.pdf | Slides from 5th of Nov student brief]]&lt;br /&gt;
* It is now possible to sign up for the [[Cyber_security_research_excellence_course | Cyber Security Research Excellence Course]]&lt;br /&gt;
* Slides from the intro brief: [[Meedia:2018-08-29_IVCM_welcome_brief.pdf]]&lt;br /&gt;
* IVCM09/18 version of the curriculum introduces major changes and phases out a number of old courses. For example, this is the last year that the ITC8050 will be taught. In some cases you can just take the new course, in other cases you will have to find an alternative. Contact Siiri if you are having trouble finding the course you need.&lt;br /&gt;
* ITC8120 (Malware I) and ITX8042 (Malware) is replaced by I905&lt;br /&gt;
* ITX8110 (Introduction to Combinatorics and Elementary Cryptography) is replaced by ITC8240&lt;br /&gt;
* ITC8010  (Legal Aspects of Cyber Security)is replaced by ITC8220. This also substitutes the course HOE7040. The course ITC8220 starts on Sept. 18th.&lt;br /&gt;
* ITV8040 Network Technology I is replaced by LTAT.06.004.in Tartu&lt;br /&gt;
* ITX8090 Information and Cyber Security Assurance in Organisations is replaced by ITC8230.&lt;br /&gt;
&lt;br /&gt;
* ITC8020 Computer Network Security is taught this fall. Lectures are Mon. 19:00-20:30 in ICT-402; Lab on Wed. at 19:30- 20:30 in ICT-401 (Timetable can be found under Optional courses in OIS) FEEL FREE TO DECLARE IT, many empty spots yet!&lt;br /&gt;
* ITX8200 System Forensics is also taught this fall. Lectures are on Thurs. 12:00- 15:30 in ICT-405 (Timetable can be found under Optional courses in OIS)&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8001 (Teaching Practice):&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** If you will teach this semester (any subject, not just cyber security related teaching; does not have to be in TalTech), then you can sign up for ITC8001 in your study plan. Make sure you send Rain Ottis a summary of your teaching plans first, though, because he needs to assess if it meets the requirements. The summary should cover the topics, volume (total teaching hours), level (MSc course, BSc course, etc.) and type of teaching (lectures, hands-on, teaching assistance, etc.). &lt;br /&gt;
** If you are not teaching this semester, but have considerable teaching practice in the past, you can get credit for ITC8001 via the VÕTA/APEL procedure. &lt;br /&gt;
* The [http://www.ttu.ee/faculties/school-of-information-technologies/it-studies/organization-of-studies-2/procedure-for-processing-contemptible-behavior/ policy for handling academic dishonesty] (plagiarism, cheating, etc.) in the IT Faculty. &lt;br /&gt;
* TalTech [http://ttu.ee/students/study-information-2/academic-information/study-regulations-2/ academic policies]. Please note §23.&lt;br /&gt;
* There are multiple versions of the curriculum. In general, the one that applies to you is the one that corresponds to the year of your enrollment.&lt;br /&gt;
* If you have not done so already, please indicate your specialization (Cyber Security, Digital Forensics or Cryptography) in OIS. If you do not make a selection, then some of the courses will end up in the wrong study module. Ask the Dean&amp;#039;s office for assistance, if necessary.&lt;br /&gt;
* General note: you can replace courses with more advanced IT courses that have at least the same ECTS. Consult with Siiri before committing to any changes, though. &lt;br /&gt;
* General note: if you take more ECTS than required in any module then this will count towards your Free Choice module. It is not necessary to actually move the courses to Free Studies in this case.&lt;br /&gt;
* General note: contact Siiri Taveter if you need to move a replacement course to the correct module (it may show up under Free Choice). Please note your specialization in your request (Cryptography, Cyber Security or Digital Forensics). You must have passed the course before it can be moved.&lt;br /&gt;
&lt;br /&gt;
== Studies ==&lt;br /&gt;
&lt;br /&gt;
==== Administrative information ====&lt;br /&gt;
&lt;br /&gt;
* Academic calendar[//tark.taltech.ee/studying/practical/academic-calendar-5/] in English &lt;br /&gt;
&lt;br /&gt;
* Academic calendar[https://tark.taltech.ee/tudengile/oppeinfo/akadeemiline-kalender/] in Estonian &lt;br /&gt;
&lt;br /&gt;
[https://ois2.ttu.ee/ Study portal]. Read about the OIS guide for the students [https://ttu.ee/students/study-information-2/academic-information/study-information-system-materials/ois-guide/ here]&lt;br /&gt;
&lt;br /&gt;
* Navigate to the Cyber Security curriculum: click ENG on the right, Select Curricula on the left, Select by &amp;quot;structural units&amp;quot; under Curricula, Open (click to the little +) &amp;quot;Faculty of Information Technology&amp;quot;,  &amp;quot;10. IVCM09 	IVCM09/13 	Cybersecurity&amp;quot; in the middle table &lt;br /&gt;
&lt;br /&gt;
* You must declare your courses for the semester by the so-called &amp;quot;red line&amp;quot; date, which is generally mid-September or mid-February, depending on the semester. Use the [http://ois.ttu.ee/pls/portal/ois2.ois_public.main OIS study portal] to declare courses. &lt;br /&gt;
&lt;br /&gt;
* Please contact Dean&amp;#039;s office for necessary passwords if you cannot log in with your ID-card and for any other kind of technical administrative help!&lt;br /&gt;
&lt;br /&gt;
==== Course web sites ====&lt;br /&gt;
&lt;br /&gt;
Please note that this is not a complete list.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050&amp;#039;&amp;#039;&amp;#039; [[ITC8050 | Strategic and Operational Aspects of Cyber Security]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITV8060&amp;#039;&amp;#039;&amp;#039; Computer Network Security (4 ECP) is available and free on Fall for second year students and can be moved to Specialization module after you have got a grade.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; [http://courses.cs.ttu.ee/pages/ITX8040 Cyber Defence seminar] &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8042&amp;#039;&amp;#039;&amp;#039; [[Malware:ITX8042:2014 | 2014 Malware]] &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8050&amp;#039;&amp;#039;&amp;#039; [[ITX8050 | Special Course in Cyber Security]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8060&amp;#039;&amp;#039;&amp;#039; [[Malware:ITX8042:2014 | 2014 Malware II]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8062&amp;#039;&amp;#039;&amp;#039; [[ITX8062 | Information Systems Mass Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8063&amp;#039;&amp;#039;&amp;#039; [[ITX8063 | Information Systems Hacking Attacks and Defence]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8071&amp;#039;&amp;#039;&amp;#039; Cyber Defense Monitoring Solutions replaces the course ITX8070 Log Mining and Disc Forensics. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8090&amp;#039;&amp;#039;&amp;#039; [[ITX8090 | Information and Cyber Security Assurance in Organisations]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8220/ITX8221&amp;#039;&amp;#039;&amp;#039; [[ITX8220 | Special Course in Digital Forensics]]&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8060&amp;#039;&amp;#039;&amp;#039; [[ITC8060|Network Protocol Design.]]&lt;br /&gt;
&lt;br /&gt;
The courses are free (the invoices are cancelled) to Cyber Security RE students and can be moved to Specialization module after you get a grade.&lt;br /&gt;
&lt;br /&gt;
==== Sources for free choice courses ====&lt;br /&gt;
&lt;br /&gt;
You can look for additional free choice courses from the following sources&lt;br /&gt;
&lt;br /&gt;
Scan the [http://ois.ttu.ee OIS study portal] for available courses this semester (takes effort, but it is useful to learn to find your way in OIS). You can find all the courses given in English (timetables of all international programs) in TalTech by looking at OIS -&amp;gt; Timetables -&amp;gt; click to GB flag in the center of the page.&lt;br /&gt;
&lt;br /&gt;
You can take [http://www.ttu.ee/faculty-of-social-sciences/language-centre-2/student-guidelines-2/ some other language course] (French, German, Russian, Finnish) offered by the [http://www.ttu.ee/faculty-of-social-sciences/language-centre-2/ Language Centre] in addition to the courses (HLI2200, HLX8040) in your curriculum. Some of the alternative courses may not be free to study. In such a case OIS will give notice when you declare the course.&lt;br /&gt;
&lt;br /&gt;
==== ITX8512 Practical Training in Information Technology ====&lt;br /&gt;
You can get credits if you have working experience in IT field. More information can be found here: [[ITX8512]]&lt;br /&gt;
&lt;br /&gt;
== Thesis and graduation ==&lt;br /&gt;
The fourth semester is reserved for writing your thesis. This is a demonstration of your professional knowledge and skills, and the process typically involves the following steps (with the help of your supervisor):&lt;br /&gt;
* identify a problem that matters&lt;br /&gt;
* research possible solutions, and select or develop the most suitable one&lt;br /&gt;
* implement the solution&lt;br /&gt;
* analyze the results of your work&lt;br /&gt;
* present your work in a professional manner in written (thesis) and oral (thesis defence) form&lt;br /&gt;
&lt;br /&gt;
[http://courses.cs.ttu.ee/pages/Thesis Thesis information] - deadlines, proposed topics, requirements, etc.&lt;br /&gt;
&lt;br /&gt;
* [https://courses.cs.ttu.ee/pages/Defended_thesis_cyber Defended thesis]&lt;br /&gt;
&lt;br /&gt;
== Scholarships ==&lt;br /&gt;
&lt;br /&gt;
There are special IT-Academy scholarships available for Cyber Security students. The scholarships are awarded based on rank in admission and the study results in the previous semesters. You will have to apply for this scholarship on OIS and OIS will also tell you if you qualify for it. Check also: [http://www.ttu.ee/public/i/infotehnoloogia-teaduskond/Tudengile/ITA/IT_Academy__stipend_M_english.docx statute of the scholarship], which is available on the faculty web site.&lt;br /&gt;
&lt;br /&gt;
== Contact ==&lt;br /&gt;
* [http://www.ttu.ee/?lang=en Tallinn University of Technology]&lt;br /&gt;
** [http://www.ttu.ee/studying/new-and-current-student/ International Study Centre] will help you in the first steps at TalTech and provides useful help along your studies.&lt;br /&gt;
** See also [http://www.ttu.ee/public/u/ulikool/kontakt/TTU_Campusekaart_juuli2010.pdf campus maps]&lt;br /&gt;
** [http://www.ttu.ee/faculty-of-information-technology/faculty-of-information-technology-1/home-2/ Faculty of Information Technology]&lt;br /&gt;
** Dean&amp;#039;s Office of IT dept: room ICT-120, phone 6203528, email i@ttu.ee &lt;br /&gt;
** program coordinator Rain Ottis, rain.ottis@ttu.ee, room ICT-430, Akadeemia 15a. Consultancy registration via e-mail.&lt;br /&gt;
** research coordinator [http://www.ttu.ee/en/personnel-search/&amp;amp;kood=T0067160 Olaf Maennel], olaf.maennel@ttu.ee, ICT-420, Akadeemia 15a. Consultancy registration via e-mail.&lt;br /&gt;
* [http://www.ut.ee/en University of Tartu]&lt;br /&gt;
** [http://www.cs.ut.ee/en Institute of Computer Science]&lt;br /&gt;
** program coordinator [http://vvv.cs.ut.ee/~unruh/ Dominique Unruh]&lt;br /&gt;
&lt;br /&gt;
== Historic information from Fall 2017 ==&lt;br /&gt;
Rearranged with new items at the top.&lt;br /&gt;
* Slides from the new student intro brief on 30AUG17: [[Meedia:IVCM_intro_brief_2017.pdf]]&lt;br /&gt;
* The &amp;#039;&amp;#039;&amp;#039;Information Systems Attacks and Defence&amp;#039;&amp;#039;&amp;#039; (ITC8070) course will start 31 Oct 2017.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8001 (Teaching Practice):&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** If you will teach this semester (any subject, not just cyber security related teaching; does not have to be in TalTech), then you can sign up for ITC8001 in your study plan. Make sure you send Rain Ottis a summary of your teaching plans first, though, because he needs to assess if it meets the requirements. The summary should cover the topics, volume (total teaching hours), level (MSc course, BSc course, etc.) and type of teaching (lectures, hands-on, teaching assistance, etc.). &lt;br /&gt;
** If you are not teaching this semester, but have considerable teaching practice in the past, you can get credit for ITC8001 via the VÕTA/APEL procedure. &lt;br /&gt;
** Teaching practice is a General Studies module course. However, if you teach on the subjects of cyber security or forensics, it may be suitable for Special Studies.&lt;br /&gt;
* For students who are studying based on the &amp;#039;&amp;#039;&amp;#039;2016 or earlier&amp;#039;&amp;#039;&amp;#039; version of the curriculum and can&amp;#039;t find a course you need to complete your studies: &lt;br /&gt;
** Once you pass the replacement course, contact the Dean&amp;#039;s Office to move it to the correct module.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;IDK1011 (Introduction to Programming)&amp;#039;&amp;#039;&amp;#039; is replaced by ICS0015 Fundamentals of Python.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITV8060 (Computer Network Security)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8020 Computer Network Security. The new course is 6 ECTS.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8040 (Cyber Defence seminar)&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230  (Digital Forensics seminar)&amp;#039;&amp;#039;&amp;#039; are replaced with ITC8100 (Seminar). It is offered in the fall semester and is designed to help students with their thesis writing process. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8041 (Legal Aspects of Cyber Security)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8010 (same name). There are minor changes in content and the course is now given on both semesters. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8042 (Malware)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8120 Malware.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8060 (Malware II)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8130 Malware II.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8062 (Information Systems Mass Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8050 (Strategic and Operational Aspects of Cyber Security), which will be offered on both semesters. The course is designed for second year students and there are limited number of seats available. If you do not fit into this semester, you can take it in the next one. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8063 (Information Systems Hacking Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITC8070 (Information Systems Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; are replaced by ITC8075 Information Systems Attacks and Defence in the 2017 curriculum. This fall is the last year where ITC8070 is taught. From 2018 we will switch to ITC8075.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8215 (Digital Evidence)&amp;#039;&amp;#039;&amp;#039; is replaced by HOE7023 (same name).&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;TMJ0110 (Introduction to Entrepreneurship)&amp;#039;&amp;#039;&amp;#039; is replaced by TMJ3300 Entrepreneurship and Business Planning.&lt;br /&gt;
* The [http://www.ttu.ee/faculties/school-of-information-technologies/it-studies/organization-of-studies-2/procedure-for-processing-contemptible-behavior/ policy for handling academic dishonesty] (plagiarism, cheating, etc.) in the IT Faculty. &lt;br /&gt;
* TalTech [http://ttu.ee/students/study-information-2/academic-information/study-regulations-2/ academic policies]. Please note §23.&lt;br /&gt;
* There are multiple versions of the curriculum. In general, the one that applies to you is the one that corresponds to the year of your enrollment.&lt;br /&gt;
* If you have not done so already, please indicate your specialization (Cyber Security, Digital Forensics or Cryptography) in OIS. If you do not make a selection, then some of the courses will end up in the wrong study module. Ask the Dean&amp;#039;s office for assistance, if necessary.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8010 Legal Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered on both semesters. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050 Strategic and Operational Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered on both semesters. [https://courses.cs.ttu.ee/pages/ITC8050 Details]&lt;br /&gt;
* General note: you can replace &amp;#039;&amp;#039;&amp;#039;Intro to IT&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Intro to Programming&amp;#039;&amp;#039;&amp;#039; with more advanced IT courses that have at least the same ECTS. Consult with Rain Ottis before committing to any changes, though. &lt;br /&gt;
* General note: if you take more ECTS than required in the Special Studies module then this will count towards your Free Choice module. It is not necessary to actually move the courses to Free Studies in this case.&lt;br /&gt;
* General note: contact Siiri Taveter if you need to move a replacement course to the correct module (it may show up under Free Choice). Please note your specialization in your request (Cyber Security or Digital Forensics). You must have passed the course before it can be moved.&lt;br /&gt;
&lt;br /&gt;
== Historic information from Spring 2017 ==&lt;br /&gt;
Rearranged with new items at the top.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Please check this page often during the first few weeks of the semester. There will be many changes.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* [[ITC8060|&amp;#039;&amp;#039;&amp;#039;ITC8061 Network Protocol Design&amp;#039;&amp;#039;&amp;#039;]] (instructor: Olaf Maennel) will start Tue, 31 Jan at 14.00-15.30 in ICT-315.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;MTAT.03.248 Introduction to Internet Psychology&amp;#039;&amp;#039;&amp;#039; (instructor: Kätlin Konstabel) will take place &amp;#039;&amp;#039;&amp;#039;in Tallinn&amp;#039;&amp;#039;&amp;#039; on Tuesdays 1000-1400 on the dates of 14 FEB, 28FEB, 14MAR, 28MAR, 11APR, 2MAY, 9MAY, 16MAY. Room ICT-315. Sign up via Tartu University OIS. The dates have been de-conflicted with ITC8050.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Special Courses&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** These special courses are suitable for your special studies module, regardless of your specialization. Once you pass the course, it can be moved to the special studies module.&lt;br /&gt;
** There will be a Special Course for students who want to participate in the &amp;#039;&amp;#039;&amp;#039;Locked Shields 2017&amp;#039;&amp;#039;&amp;#039; exercise. Register for it under ITX8220, ITX8221 or ITC8112 (USE ONLY ONE CODE!) with professor Maennel as the instructor. There are limited slots, participation is strictly restricted to students who hold a passport issued by a Nato member country.  The first meeting will be on 13 Feb 2017 at 18.00-20.30 in ICT-315. [https://courses.cs.ttu.ee/w/images/7/7e/LS17_Course_at_TTU.pdf More info here].&lt;br /&gt;
** There will be a Special Course on &amp;#039;&amp;#039;&amp;#039;Historical Cryptosystems&amp;#039;&amp;#039;&amp;#039;. You can register for it under ITC8111 or ITC8112 with dr Aleksandr Lenin as instructor. The course will look at the history of cryptography and students will have first hand experience using and breaking things like substitution ciphers. More info coming soon.&lt;br /&gt;
** There will be a Special course for students who want to participate in the &amp;#039;&amp;#039;&amp;#039;Student Challenge 9/12&amp;#039;&amp;#039;&amp;#039;. You can register for it under ITC8111 or ITC8112 with dr Hayretdin Bahsi as instructor. Emin Caliskan will serve as co-instructor. This is a competition that focuses on the strategic aspects of cyber security. Our aim is to send a student team to Switzerland later this spring, provided they pass the entry round. There will be limited slots. The lessons will take place in weeks 2,4,5,8,9,10 and 13 in room ICT 312 on Tuesdays between 18:00-20:30. Please enrol in [https://ained.ttu.ee/course/view.php?id=87  TTU Moodle Course Page].&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8001 (Teaching Practice):&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** If you will teach this semester (any subject, not just cyber security related teaching; does not have to be in TalTech), then you can sign up for ITC8001 in your study plan. Make sure you send Rain Ottis a summary of your teaching plans first, though, because he needs to assess if it meets the requirements. The summary should cover the topics, volume (total teaching hours), level (MSc course, BSc course, etc.) and type of teaching (lectures, hands-on, teaching assistance, etc.). &lt;br /&gt;
** If you are not teaching this semester, but have considerable teaching practice in the past, you can get credit for ITC8001 via the VÕTA/APEL procedure. &lt;br /&gt;
** Teaching practice is a General Studies module course. However, if you teach on the subjects of cyber security or forensics, it may be suitable for Special Studies.&lt;br /&gt;
* For students who are studying based on the &amp;#039;&amp;#039;&amp;#039;2015 or earlier&amp;#039;&amp;#039;&amp;#039; version of the curriculum and can&amp;#039;t find a course you need to complete your studies:&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8040 (Cyber Defence seminar)&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230  (Digital Forensics seminar)&amp;#039;&amp;#039;&amp;#039; are replaced with ITC8100 (Seminar). It is offered in the fall semester and is designed to help students with their thesis writing process. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8041 (Legal Aspects of Cyber Security)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8010 (same name). There are minor changes in content and the course is now given on both semesters. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8215 (Digital Evidence)&amp;#039;&amp;#039;&amp;#039; is replaced by HOE7023 (same name).&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8062 (Information Systems Mass Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8050 (Strategic and Operational Aspects of Cyber Security), which will be offered on both semesters. The course is designed for second year students and there are limited number of seats available. If you do not fit into this semester, you can take it in the next one. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8063 (Information Systems Hacking Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8070 (Information Systems Attacks and Defence). The new course is 4 ECTS and there are limited slots available. &lt;br /&gt;
** Once you pass the replacement course, contact the Dean&amp;#039;s Office to move it to the correct module.&lt;br /&gt;
* The [http://www.ttu.ee/faculties/school-of-information-technologies/it-studies/organization-of-studies-2/procedure-for-processing-contemptible-behavior/ policy for handling academic dishonesty] (plagiarism, cheating, etc.) in the IT Faculty. &lt;br /&gt;
* TalTech [http://ttu.ee/students/study-information-2/academic-information/study-regulations-2/ academic policies]. Please note §23.&lt;br /&gt;
* There are multiple versions of the curriculum. In general, the one that applies to you is the one that corresponds to the year of your enrollment.&lt;br /&gt;
* If you have not done so already, please indicate your specialization (Cyber Security, Digital Forensics or Cryptography) in OIS. If you do not make a selection, then some of the courses will end up in the wrong study module. Ask the Dean&amp;#039;s office for assistance, if necessary.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8010 Legal Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered on both semesters. Instructor: Anna-Maria Osula. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050 Strategic and Operational Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered on both semesters. [https://courses.cs.ttu.ee/pages/ITC8050 Details]&lt;br /&gt;
* General note: you can replace &amp;#039;&amp;#039;&amp;#039;Intro to IT&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Intro to Programming&amp;#039;&amp;#039;&amp;#039; with more advanced IT courses that have at least the same ECTS. Consult with Rain Ottis before committing to any changes, though. &lt;br /&gt;
* General note: if you take more ECTS than required in the Special Studies module then this will count towards your Free Choice module. It is not necessary to actually move the courses to Free Studies in this case.&lt;br /&gt;
* General note: contact Rain Ottis if you need to move HOE7023, ITC8010, ITC8050 or ITC8070 to the correct module (it may show up under Free Choice). Please note your specialization in your request (Cyber Security or Digital Forensics). You must have passed the course before it can be moved.&lt;br /&gt;
* Tartu University courses &amp;#039;&amp;#039;&amp;#039;MTAT.03.246&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;MTAT.03.247&amp;#039;&amp;#039;&amp;#039; are combined into one 6 ECTS course &amp;#039;&amp;#039;&amp;#039;MTAT.03.307&amp;#039;&amp;#039;&amp;#039; (Principles of Secure Software Design). &lt;br /&gt;
* Tartu University Research Seminar on Cryptography (MTAT.07.019) gets a new code: &amp;#039;&amp;#039;&amp;#039;MTAT.07.022&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
== Historic information from fall of 2016 ==&lt;br /&gt;
Rearranged with new items at the top.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Please check this page often during the first few weeks of the semester. There will be many changes.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[[ITC8100 course page]] (Seminar)&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8001 (Teaching Practice):&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** If you will teach this semester (any subject, not just cyber security related teaching; does not have to be in TalTech), then you can sign up for ITC8001 in your study plan. Make sure you send Rain Ottis a summary of your teaching plans first, though, because he needs to assess if it meets the requirements. The summary should cover the topics, volume (total teaching hours), level (MSc course, BSc course, etc.) and type of teaching (lectures, hands-on, teaching assistance, etc.). &lt;br /&gt;
** If you are not teaching this semester, but have considerable teaching practice in the past, you can get credit for ITC8001 via the VÕTA/APEL procedure. &lt;br /&gt;
** Teaching practice is a General Studies module course. However, if you teach on the subjects of cyber security or forensics, it may be suitable for Special Studies.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8220 Special Course in Digital Forensics&amp;#039;&amp;#039;&amp;#039; will be offered in the second half of this semester. The instructor is Emin Caliskan. You can also declare it as ITX8221, if you have already taken ITX8220. The course will take place during the second half of the semester (weeks 9-16) on Tuesdays 1745-2100 in room ICT-403. There will be an intro brief on Tuesday the 13th of September at 1745 in ICT-315. The course will be available for both specializations as a special study course, but Forensics students have priority.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8090 Information and Cyber Security Assurance in Organisations&amp;#039;&amp;#039;&amp;#039; is scheduled for Tuesdays 1400-1715 in room ICT-312.&lt;br /&gt;
* For students who are studying based on the &amp;#039;&amp;#039;&amp;#039;2015 or earlier&amp;#039;&amp;#039;&amp;#039; version of the curriculum and can&amp;#039;t find a course you need to complete your studies:&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8040 (Cyber Defence seminar)&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230  (Digital Forensics seminar)&amp;#039;&amp;#039;&amp;#039; are replaced with ITC8100 (Seminar). It is offered in the fall semester and is designed to help students with their thesis writing process.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8041 (Legal Aspects of Cyber Security)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8010 (same name). There are minor changes in content and the course is now given on both semesters. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8215 (Digital Evidence)&amp;#039;&amp;#039;&amp;#039; is replaced by HOE7023 (same name).&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8062 (Information Systems Mass Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8050 (Strategic and Operational Aspects of Cyber Security), which will be offered on both semesters. The course is designed for second year students and there are limited number of seats available. If you do not fit into this fall&amp;#039;s version, you can take it in the spring. &lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;ITX8063 (Information Systems Hacking Attacks and Defence)&amp;#039;&amp;#039;&amp;#039; is replaced by ITC8070 (Information Systems Attacks and Defence). The new course will be 4 ECTS and there are limited slots available. &lt;br /&gt;
* There is a new policy for handling academic dishonesty (plagiarism, cheating, etc.) in the IT Faculty. It is currently available in Estonian in [http://www.ttu.ee/infotehnoloogia-teaduskond/infotehnoloogia-teaduskond-1/it-tudengile/oppetookorraldus-3/vaaritu-kaitumise-menetlemise-kord/ here]. English version will follow soon.&lt;br /&gt;
* If you have a time conflict with a practice session and another lecture (for example, ITV8040 practice during ITC8100), then you can check the schedule for alternative practice sessions (IVCM11 / IVCM13).&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8080 Hardening operating systems and services&amp;#039;&amp;#039;&amp;#039; will not be offered this semester. It will be offered next year to second year students.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8080 Simulation of Attacks and Defense&amp;#039;&amp;#039;&amp;#039; will not be offered this semester.&lt;br /&gt;
* Students who plan to specialize in &amp;#039;&amp;#039;&amp;#039;Cryptography&amp;#039;&amp;#039;&amp;#039; (in Tartu) should contact Rain Ottis ASAP.&lt;br /&gt;
* There is an EST MoD [http://www.kaitseministeerium.ee/et/eesmargid-tegevused/teadus-ja-arendustegevus/kaitsealaste-magistritoode-stipendiumikonkurss scholarship] (page in Estonian, but all can apply) for the incoming students (2016) who will write a defence related thesis. Deadline for application is 07 SEP 2016.&lt;br /&gt;
* There is an EST MoD [http://www.kaitseministeerium.ee/et/eesmargid-tegevused/teadus-ja-arendustegevus/kuberkaitse-magistrioppe-stipendium scholarship] (page in Estonian, but all can apply) for the cyber security students.&lt;br /&gt;
* TalTech [http://ttu.ee/students/study-information-2/academic-information/study-regulations-2/ academic policies]. Please note §23.&lt;br /&gt;
* There are multiple versions of the curriculum. In general, the one that applies to you is the one that corresponds to the year of your enrollment.&lt;br /&gt;
* If you have not done so already, please indicate your specialization (Cyber Security or Digital Forensics) in OIS. If you do not make a selection, then some of the courses will end up in the wrong study module. Ask the Dean&amp;#039;s office for assistance, if necessary.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IDN0110 Data Mining and Network Analysis&amp;#039;&amp;#039;&amp;#039; will be offered this semester. Instructor: dr Sven Nõmm. [https://courses.cs.ttu.ee/pages/Data_Mining_and_network_analysis_IDN0110 Details]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8010 Legal Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered on both semesters. Instructor: Anna-Maria Osula. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050 Strategic and Operational Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered on both semesters. [https://courses.cs.ttu.ee/pages/ITC8050 Details]&lt;br /&gt;
* General note: you can replace &amp;#039;&amp;#039;&amp;#039;Intro to IT&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Intro to Programming&amp;#039;&amp;#039;&amp;#039; with more advanced IT courses that have at least the same ECTS. Consult with Rain Ottis before committing to any changes, though. &lt;br /&gt;
* General note: if you take more ECTS than required in the Special Studies module then this will count towards your Free Choice module. It is not necessary to actually move the courses to Free Studies in this case.&lt;br /&gt;
* General note: contact Rain Ottis if you need to move HOE7023, ITC8010, ITC8050 or ITC8070 to the correct module (it may show up under Free Choice). Please note your specialization in your request (Cyber Security or Digital Forensics). You must have passed the course before it can be moved.&lt;br /&gt;
* Tartu University courses &amp;#039;&amp;#039;&amp;#039;MTAT.03.246&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;MTAT.03.247&amp;#039;&amp;#039;&amp;#039; are combined into one 6 ECTS course &amp;#039;&amp;#039;&amp;#039;MTAT.03.307&amp;#039;&amp;#039;&amp;#039; (Principles of Secure Software Design). &lt;br /&gt;
* Tartu University Research Seminar on Cryptography (MTAT.07.019) gets a new code: &amp;#039;&amp;#039;&amp;#039;MTAT.07.022&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
* ITC8070 (Information Systems Attacks and Defence), will run in the 2nd half of the semester (week 9-16).  There will be an information session on Monday, 12 September at 17.45 in ITC-315, for all those students who are undecided if they want to take it or not. No content will be covered on 12 Sep, and attending this session is optional.&lt;br /&gt;
&lt;br /&gt;
== Historic information from spring 2016 ==&lt;br /&gt;
Rearranged with new items at the top.&lt;br /&gt;
* There is an EST MoD [http://www.kaitseministeerium.ee/et/eesmargid-tegevused/teadus-ja-arendustegevus/kaitsealaste-magistritoode-stipendiumikonkurss scholarship] (page in Estonian, but all can apply) for the incoming students (2016) who will write a defence related thesis. Deadline for application is 07 SEP 2016.&lt;br /&gt;
* There is an EST MoD [http://www.kaitseministeerium.ee/et/eesmargid-tegevused/teadus-ja-arendustegevus/kuberkaitse-magistrioppe-stipendium scholarship] (page in Estonian, but all can apply) for the cyber security students.&lt;br /&gt;
* TalTech [http://ttu.ee/students/study-information-2/academic-information/study-regulations-2/ academic policies]. Please note §23.&lt;br /&gt;
* There are multiple versions of the curriculum. In general, the one that applies to you is the one that corresponds to the year of your enrollment.&lt;br /&gt;
* If you have not done so already, please indicate your specialization (Cyber Security or Digital Forensics) in OIS. If you do not make a selection, then some of the courses will end up in the wrong study module. Ask the Dean&amp;#039;s office for assistance, if necessary.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;June thesis defence&amp;#039;&amp;#039;&amp;#039; candidates - please indicate your thesis topic by 01 FEB in Moodle. See the [https://courses.cs.ttu.ee/pages/Thesis Thesis] page for more details.  &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IDN0110 Data Mining and Network Analysis&amp;#039;&amp;#039;&amp;#039; will be offered this semester. Lectures are on Mondays 1745-1915, practice on Tuesdays 1400-1530. Instructor: dr Sven Nõmm. [https://courses.cs.ttu.ee/pages/Data_Mining_and_network_analysis_IDN0110 Details]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8010 Legal Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered this semester and in the fall semester. Instructor: Anna-Maria Osula. Fridays 1200-1530 in room ICT-315. &lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8050 Strategic and Operational Aspects of Cyber Security&amp;#039;&amp;#039;&amp;#039; will be offered this semester and in the fall semester. For this semester, the course is on even week Wednesdays 1745-2100 in ICT-315. &amp;#039;&amp;#039;&amp;#039;First lecture on 10 FEB at 2000-2100; 2nd lecture re-scheduled for spring (TBA)&amp;#039;&amp;#039;&amp;#039;. [https://courses.cs.ttu.ee/pages/ITC8050 Details]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;[https://courses.cs.ttu.ee/pages/ITC8060 ITC8061 Network Protocol Design]&amp;#039;&amp;#039;&amp;#039; replaces ITC8060 (instructor: prof Olaf Maennel). ITC8061 will be &amp;#039;&amp;#039;&amp;#039;6 ECTS&amp;#039;&amp;#039;&amp;#039; (elective in Special Studies module, both specializations).&lt;br /&gt;
* [[ITC8111]] Special Course&amp;#039;&amp;#039;&amp;#039; on &amp;#039;&amp;#039;&amp;#039;Locked Shields&amp;#039;&amp;#039;&amp;#039; will take place. This will be available for both specializations. Instructor: Kaur Kasak.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITC8112 Special Course&amp;#039;&amp;#039;&amp;#039; on &amp;#039;&amp;#039;&amp;#039;current cyber security topics&amp;#039;&amp;#039;&amp;#039; will take place in ICT-312 on odd week Wednesdays 1745-2015. This will be available for both specializations. Instructor: dr Hayretdin Bahsi. [https://courses.cs.ttu.ee/pages/ITC8112 Details] You can access to course information via [https://ained.ttu.ee/course/view.php?id=32 Moodle]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;MTAT.03.248 Introduction to Internet Psychology&amp;#039;&amp;#039;&amp;#039; (instructor: Kätlin Konstabel) will take place &amp;#039;&amp;#039;&amp;#039;in Tallinn&amp;#039;&amp;#039;&amp;#039; during first half of the semester on Tuesdays 1000-1400 on the dates of 16 FEB, 01 MAR, 15 MAR, 29 MAR - total of 4 lectures. Room ICT-315. Sign up via Tartu University OIS (admin problems -&amp;gt; hanna-liisa.ennet@ut.ee). &amp;#039;&amp;#039;&amp;#039;NB! First lecture now on 16 FEB. Monday lectures cancelled.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;MTAT.03.307 Secure Software Design&amp;#039;&amp;#039;&amp;#039; will be available with a &amp;#039;&amp;#039;&amp;#039;mostly remote study&amp;#039;&amp;#039;&amp;#039; option  (minimal travel needed) this semester. The first lecture in Tartu on 18 FEB is mandatory.  Sign up via Tartu University OIS (admin problems -&amp;gt; hanna-liisa.ennet@ut.ee). [https://courses.cs.ut.ee/2016/ssd/spring Details]&lt;br /&gt;
* It is highly recommended that &amp;#039;&amp;#039;&amp;#039;Digital Forensics students&amp;#039;&amp;#039;&amp;#039; take at least one course from Tartu University (see the previous two bullets for possible candidates that require little or no travel). &lt;br /&gt;
* General note: you can replace &amp;#039;&amp;#039;&amp;#039;Intro to IT&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Intro to Programming&amp;#039;&amp;#039;&amp;#039; with more advanced IT courses that have at least the same ECTS. Consult with Rain Ottis before committing to any changes, though. &lt;br /&gt;
* General note: if you take more ECTS than required in the Special Studies module than this will count towards your Free Choice module. It is not necessary to actually move the courses to Free Studies in this case.&lt;br /&gt;
* General note: contact Rain Ottis if you need to move HOE7023, ITC8010, ITC8050 or ITC8070 to the correct module (it may show up under Free Choice). Please note your specialization in your request (Cyber Security or Digital Forensics). You must have passed the course before it can be moved.&lt;br /&gt;
* If you took the Oxford course in the fall, you can get credit through the VÕTA system as IDU0402. More details from the Dean&amp;#039;s office. It is suitable for Free or Special studies.&lt;br /&gt;
* Tartu University courses &amp;#039;&amp;#039;&amp;#039;MTAT.03.246&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;MTAT.03.247&amp;#039;&amp;#039;&amp;#039; are combined into one 6 ECTS course &amp;#039;&amp;#039;&amp;#039;MTAT.03.307&amp;#039;&amp;#039;&amp;#039; (Principles of Secure Software Design). &lt;br /&gt;
* Tartu University Research Seminar on Cryptography (MTAT.07.019) gets a new code: &amp;#039;&amp;#039;&amp;#039;MTAT.07.022&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Historic information from fall 2015 ==&lt;br /&gt;
&lt;br /&gt;
Note this is historic information for last semester and only may only used as reference. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;January thesis defence dates:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
** 14 DEC - deadline for applying for defence in OIS (thesis code ITC70LT). &lt;br /&gt;
** 05 JAN - deadline for submitting your thesis for review. &lt;br /&gt;
** 18 JAN - thesis defence day.&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
* The new instructor for &amp;#039;&amp;#039;&amp;#039;ITX8090&amp;#039;&amp;#039;&amp;#039; (Information and Cyber Security Assurance in Organisations) is Dr Andro Kull.&lt;br /&gt;
&lt;br /&gt;
* If a course does not show up on your schedule: &lt;br /&gt;
** try a manual search for that specific course. Electives (especially from different departments) are often not added to the full schedule.&lt;br /&gt;
** wait. Some of them are not in the system yet, but this should be resolved by the end of this week.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8041&amp;#039;&amp;#039;&amp;#039; (Legal Aspects of Cyber Security) is replaced by &amp;#039;&amp;#039;&amp;#039;ITC8010&amp;#039;&amp;#039;&amp;#039; (same name). There are minor changes in content and the course is now given on both semesters. For the fall semester of 2015 the course is given by Agnes Käsper. Do not take it, if you have already passed ITX8041. &lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8215&amp;#039;&amp;#039;&amp;#039; (Digital Evidence) is replaced by &amp;#039;&amp;#039;&amp;#039;HOE7023&amp;#039;&amp;#039;&amp;#039; (same name); taught by Agnes Käsper. There are no significant changes to the content. Do not take it, if you have already passed ITX8215. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place every week for weeks 1-8 in U03-222 on Mondays at 1745-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8062&amp;#039;&amp;#039;&amp;#039; (Information Systems Mass Attacks and Defence) is replaced by &amp;#039;&amp;#039;&amp;#039;ITC8050&amp;#039;&amp;#039;&amp;#039; (Strategic and Operational Aspects of Cyber Security), which will be offered on both semesters. The course will be given on odd weeks throughout the semester (previously taught on weeks 1-8). The course is designed for second year students and there are limited number of seats available. If you do not fit into this fall&amp;#039;s version, you can take it in the spring. Do not take it, if you have already passed ITX8062. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place on odd weeks throughout the semester in ICT-A1 on Wednesday 1745-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;ITX8063&amp;#039;&amp;#039;&amp;#039; (Information Systems Hacking Attacks and Defence) is replaced by &amp;#039;&amp;#039;&amp;#039;ITC8070&amp;#039;&amp;#039;&amp;#039; (Information Systems Attacks and Defence). The new course will be 4 ECTS and there are limited slots available. Do not take it, if you have already passed ITX8063. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place every week on weeks 9-16 in SOC-212 on Tuesday 1745-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* If you enrolled in 2014 or earlier, then the replacement courses (see above) may not display in the correct modules. Do not worry about this, we will move them at the end of the semester. Just contact Rain Ottis during the exam session and let him know what the situation is.&lt;br /&gt;
&lt;br /&gt;
* A special course on forensics takes place (&amp;#039;&amp;#039;&amp;#039;ITX8220/ITX8221&amp;#039;&amp;#039;&amp;#039; - you should pick a code that you have not used yet) in the second half of the semester. This will be a hands on course that is going to look at the forensics tools in Kali Linux. It is taught by Erika Matsak. If you consider taking it, you will have to sign up for it by September 10th. &amp;#039;&amp;#039;&amp;#039;NB! Schedule change: it takes place every week on weeks 9-16 in ICT-403 on Monday 1930-2100 and Thursday 1930-2100.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* The seminars [https://courses.cs.ttu.ee/pages/ITX8040 &amp;#039;&amp;#039;&amp;#039;ITX8040&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8230&amp;#039;&amp;#039;&amp;#039;] (depending on your focus) are taking place together on Tuesdays, 1600-1730 in room ICT-315. They are designed to help you with your thesis and should be taken on the third semester. However, you can also take it during your first semester, if you already have some idea about your thesis. You can only sign up for one seminar. If you have passed either one in the past, then you can attend, but not get credit for it. &lt;br /&gt;
&lt;br /&gt;
* There will be a Special Course on Cyber Security ([https://courses.cs.ttu.ee/pages/ITX8050 &amp;#039;&amp;#039;&amp;#039;ITX8050&amp;#039;&amp;#039;&amp;#039;]) that focuses on national and international cyber security questions (policy/strategy level). The course is designed to prepare candidates for the Cyber Challenge, although there is no guarantee that those who pass the course actually get to go. Last year we sent a team to Switzerland and they did very well. This course will be run by Tiia Sõmer during the second half of the semester, on Thursday evenings at 1800-1930 in ICT-315.  &lt;br /&gt;
&lt;br /&gt;
* Information about &amp;#039;&amp;#039;&amp;#039;language courses&amp;#039;&amp;#039;&amp;#039; in [http://www.ttu.ee/faculty-of-social-sciences/language-centre-2/student-guidelines-2/ English] and in [http://www.ttu.ee/?id=14217 Estonian].&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;IDN0110&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;ITX8080&amp;#039;&amp;#039;&amp;#039; are not offered this semester.&lt;/div&gt;</summary>
		<author><name>Kristi</name></author>
	</entry>
</feed>