more advice, or a more general overview, please don't hesitate to contact. 2012, Felix Glaser, Current and Future Botnet Techniques, Bachelor's thesis, supervised by Mark Schlösser. Additionally, lectures on cryptography (for example by Prof. In, proceedings of the 7th International Workshop on Security Measurements and Metrics (MetriSec'11), ieee Computer Society Press. 2011, Cornelius Aschermann, A Code Analysis Toolkit for Ruby Security Audits, Bachelor's thesis, supervised by Georg Neugebauer. Stephan Escher, last modified: Jun 04, 2018, go to top. Computers Security, 53: 156-173, 2015. 2012, Bastian Manske, Analysis and Detection of Botnets using SMS for Command and Control Traffic on the Android Platform, Diploma thesis, supervised by Marián Kühnel. Compliance is usually assessed by analyzing audit logs, which record user behavior, against policy specifications. 2011, Björn Marschollek, Comparative Study of Protection Mechanisms for Mobile Operating Systems, Diploma thesis, supervised by André Egners.
Stefan Wüller 2016, Jens Piekenbrinck, Android Malware Obfuscation and Deobfuscation, supervised. A main feature of collaborative systems is the possibility to share (possibly sensitive) information. Stefan Wüller 2015, Wadim Pessin, Towards Securing Two-Party Bartering Against the power of introverts essay Active Attackers, supervised. The project requires investigation on systematic log auditing techniques, use of patterns and privacy metrics to detect and quantify infringements. Patrick Herrmann 2014, Manfred Smieschek, Genealogy of Mobile Malware Targeting the Android OS, supervised.
This is very important. By Model ing it mathematically you can predict the spread. Types of models could be epidemic. Trying to identify a topic for your studies requires one to read to some extent.