PNS: Protection in Networked Systems ‒ Trust, Resilience, and Privacy

Course content

The lecture Protection in Networked Systems teaches concepts of IT-Security that go beyond individual protection goals. Individual goals – and methods to achieve them, e.g., cryptography – are fundamentals for this lecture and will not be covered. The focus of this lecture is the achievement of advanced protection goals in the context of emerging networked systems.

- Resilient networks: measurement of resilience and dependability, methods to increase resilience in networked systems.
- Modelling and Simulation of Complex Systems: Digital Twins, relationships in socio-technical systems (e.g. the role of computation, data and their management, behavior representation of/in the system)
- Network & System Protection: intrusion detection, endpoint & insider threats, botnet mitigation
- Endpoint Protection: security & privacy for mobile devices, software security
- Computational Trust: models and mechanisms
- Machine Learning and Security
- Privacy Protection: concepts & definitions, privacy in networks and protocols, anonymous communication
- Security & Privacy from an Industry Perspective

See the Moodle course for more information and announcements.

NOTE: This is one of the courses that is taken over by our partner lecturers, usually held every two semesters. You may want to consult TUCAN to see if it is offered in the coming semester.

Teaching Staff

  Name Contact
Priv.-Doz. Dr. habil. Andrea Tundis
Mornewegstraße 26-32 | 64293 Darmstadt - 2nd floor

Schedule

Type Time Room Start
Lecture 14:25 – 16:05 202/C205 – Bosch Hörsaal – AKTUELL GESPERRT,
S105/122 (changes will be announced on the Moodle)
Di, 16. Apr. 2024
Exam TBA TBA

The integrated lecture Protection in Networked Systems ‒ Trust, Resilience, and Privacy covers the topics of computational trust, resilient and anonymous networks, and collaborative defense mechanisms. By attending this course, the students will be able to understand the problems and solutions in the context of networked systems. The course content will consider the concept of End-to-End systems emphasizing on users, devices, networks, and applications or services.

Knowledge of IT Security and Mathematics according to 1-4 semester of B.Sc. Computer Science

  • From the detection towards a pyramidal classification of terrorist propaganda, 2023. Andrea Tundis, Ahmed Ali Shams, Max Mühlhäuser, In: Journal of Information Security and Applications, Vol.79, 2023,103646, ISSN 2214-2126,
  • A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources, 2022. Andrea Tundis, Samuel Ruppert, Max Mühlhäuser. In: Computers & Security, Vol. 113, 102576, ISSN 0167-4048.
  • Formal requirements modeling for cyber-physical systems engineering: An integrated solution based on FORM-L and Modelica, 2022. Daniel Bouskela, Alberto Falcone, Alfredo Garro, Audrey Jardin, Martin Otter, Nguyen Thuy, Andrea Tundis. Requirements Engineering, pp.1-30, Springer, London.
  • Detailing Reviews and Ratings for Trust-Enhanced Composition, Florian Volk, 272 pages, 2015, ISBN: 9783736991668 (print), 9783736981669 (e-book)
  • Advanced Monitoring in P2P Botnets – A Dual Perspective, Shankar Karuppayah, Springer, 2018 (book).
  • Taxonomy and Survey of Collaborative Intrusion Detection, Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer, ACM Computing Surveys, Vol. 47 Issue 4, 2015.
  • Selected book chapters and scientific publications