An "agent" or "client" in the context of mobile forensics is the program deployed using an exploit to a mobile device to facilitate extraction of the data from the phone. Some agents can also do other functions like passcode brute-force attacks.
Honours and Masters project
Displaying 1 - 10 of 256 honours projects.
Don’t Miss the Exit: Identifying Critical States in Sequential Decision-Making for Biodiversity
Optimal policies derived from decision-theoretic models such as Markov Decision Processes (MDPs) often prescribe a single “best” action for every state. However, in real-world conservation contexts, managers rarely follow these prescriptions perfectly—due to uncertainty, limited trust, or operational constraints. This project explores how to make optimal policies more useful and interpretable by helping managers identify which states are critical to get right.
Learning Analytics for Concept Map Analysis
This project focuses on the learning analytics of concept maps created by students in individual or collaborative learning settings. The central aim is to analyse the structure, semantics, and evolution of concept maps as representations of students’ knowledge. The project will explore how computational methods can be used to model learning processes and epistemic development through these artefacts.
Depending on your research trajectory, you may investigate questions such as:
General Software Engineering projects -- propose your own project!
If you have any promising idea to work on, and you think I can help you somehow, please feel free to talk to me.
here are some examples that previous students proposed:
1. design and implement some interesting software
2. conduct an study related to software performance
3. design a fancy tool to visualize some data
4. design some IDE extension
Privacy-Enhancing Technologies for the Social Good
Privacy-Enhancing Technologies (PETs) are a set of cryptographic tools that allow information processing in a privacy-respecting manner. As an example, imagine we have a user, say Alice, who wants to get a service from a service provider, say SerPro. To provide the service, SerPro requests Alice's private information such as a copy of her passport to validate her identity. In a traditional setting, Alice has no choice but to give away her highly sensitive information.
Cybersecurity and Cryptography in the Quantum Age
Motivation: The Unseen Bedrock of Modern Life
Cybersecurity and cryptography are the invisible, essential foundations of the modern digital world. Every day, billions of transactions and communications rely on complex mathematical puzzles to ensure confidentiality, integrity, authenticity, privacy and even more security features.
Immersive Visual Analytics of Cultural Heritage Images
This project aims to create a novel immersive visual analytics system to facilitate the exploration and insights generation of thousands of cultural heritage images. Criteria for students:
interest in immersive technology and cultural heritage, strong dedication, basic knowledge of image analysis (e.g., segmentation, classification, clustering) and its technical skills (e.g., Python), experience in Swift programming or Unity is desirable, understanding of LLM/GenAI platforms and APIs is desirable.Quantum-Resistant Digital Provenance
Digital provenance refers to the process of verifying and tracing the origins, lifecycle, and integrity of digital content. C2PA (Coalition for Content Provenance and Authenticity) is an initiative founded by multiple technology and media companies, aiming to address the increasing concern of misleading information and disinformation on the internet in the age of AI. The main objective of C2PA is to establish a standardized approach for digital content provenance, which essentially means tracing the origin and verifying the integrity of digital content.
Advanced Detection and Mitigation Techniques for Counter-Unmanned Aerial Systems
This project will investigate counter-unmanned aerial system (C-UAS) technologies for the detection and mitigation of malicious drones. With the increasing accessibility of small UAVs, there is a growing need for effective technical solutions to identify and neutralize unauthorized aerial threats. The project will explore a broad range of C-UAS methods, including but not limited to networking-based detection and coordination techniques, machine learning, and both active and passive mitigation approaches.
Integrating Blockchain into Real Estate Systems: A Technical Exploration of Tokenization
This project investigates the technical dimensions of real estate asset tokenization, with a particular focus on the challenges of integrating blockchain technology into the real estate sector. While tokenization promises to enhance liquidity, efficiency, and transparency in property transactions, its practical implementation faces significant technological hurdles. The project will examine key issues such as data interoperability, smart contract design, secure digital identity management, and scalability of blockchain networks in handling complex real estate assets.