FUN projects (spring 2025)

electrical engineering and computer science at UVic
Post Reply
pan
Posts: 58844
Joined: Mon Sep 11, 2006 10:23 am

FUN projects (spring 2025)

Post by pan »

reading summaries and video presentations

Hal, Security and Data Accountability in Distributed Systems: A Provenance Survey,
Maximillian, IEEE 802.11s Wireless Mesh Networks: Challenges and Perspectives,
Payton, Distributed prioritized experience replay,
Truman, Associating the Randomized Bluetooth MAC Addresses of a Device,
Khushboo, Layer-based examination of cyber-attacks in IoT,
Angus, A Study of Licklider Transmission Protocol in Deep-Space Communications in Presence of Link Disruptions,
Cristina, A Comparative Analysis of Honeypots on Different Cloud Platforms,
Holly, Random walks in peer-to-peer networks,
Sergio, Fighting pollution dissemination in peer-to-peer networks, https://sites.google.com/view/csc446pro ... -summary-4
Sam, Media over QUIC: Initial Testing, Findings and Results,
Mathew, Adaptive Search in Unstructured Peer-to-Peer networks based on Ant colony and Learning Automata,
Ryan, Wireless Security Protocols WPA3: A Systematic Literature Review, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=VnIhfq
Shiyi, Resource Allocation Modes in C-V2X: From LTE-V2X to 5G-V2X,
Mike, Exploring the BBRv2 Congestion Control Algorithm for use on Data Transfer Nodes,
Nelson, A Comparative Analysis of Metaheuristic Techniques for High Availability Systems,
Gabriel, What’s Next for Datacenter Load Balancers – A Comparative Performance Study of the State-of-the-Art,
Emily, Zero Downtime Release: Disruption-free Load Balancing of a Multi-Billion User Website,
Luma, RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling services
Tyler, Federated learning through model gossiping in wireless sensor networks,
Norman, GameTE: A Game-Theoretic Distributed Traffic Engineering in Trustless Multi-Domain SDN,
Liam, A comprehensive survey on DDoS attacks detection & mitigation in SDN-IoT network,
Yasmin, Load-balancing techniques for Distributed Storage over the Network,
Noa, A probabilistic Model for Message Propagation in Two-Dimensional Vehicular Ad-Hoc Networks,
Harper, SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=HbkpSQ
Seth, Peer-to-peer architectures for massively multiplayer online games,
Casper, Improving peer coordination in mobile P2P networks using fuzzy-based systems, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=uVD9kv
Timon, Peer-to-Peer Network Security Issues and Analysis: Review, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=yu3Q95
Ali, Search Algorithms for Unstructured Peer-to-Peer Networks, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=PrrbS3
Hayden, Network intrusion detection system using deep learning, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=Hm3J7k
Ian, Security Assessment of Intelligent Connected Vehicles Based on the Cyber Range,
Quinn, Security threats in Bluetooth technology,
Julia, Smart Parking: Enhancing Urban Mobility with Fog Computing and Machine Learning-Based Parking Occupancy Prediction, https://uvic-my.sharepoint.com/:v:/g/pe ... A?e=WeKGfJ
Ben, Towards SSH3: how HTTP/3 improves secure shells,
Simon, Research on General Model of Intelligence Level for Smart Home,
Phuong, FybrrStream: A WebRTC based efficient and scalable P2P live streaming platform,
Jack, BLUFFS: Bluetooth forward and future secrecy attacks and defenses,
Diyan, A survey on the state-of-the-art CDN architectures and future directions,
Ben, Machine Learning in Network Anomaly Detection: A Survey,
Andrei, Sybil Attack Detection for Secure IoT-Based Smart Healthcare Environments,
Ricky, Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads,
YoungHyo, A Forensic Analysis of the Tor Network in Tails Operating system,
Suhan, A Survey on the Security Issues of QUIC, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=QkT1aZ
Siyu, An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=tvVMmx
Zhang, Performance Comparison of IEEE 802.11p and LTE-V2X Through Field-Tests and Simulations,
Taylor, Neural Network for Predicting Network Failure,
Emmett, What a juke! A collaborative music sharing system,
Taha, Peer-to-Peer vs ClientServer Reliability and Efficiency of a Content Distribution Service,
Baz, SybilGuard: Defending against Sybil Attacks via Social Networks,
Alpar, SecureCyclon: Dependable Peer Sampling,
Chris, Dissecting Performance of Production QUIC,
Dustin, Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=x4BwFy
Max, IoTSecSim: A framework for modelling and simulation of security in Internet of things,
Dario, Cost-Efficient and Quality-of-Experience-Aware Player Request Scheduling and Rendering Server Allocation for Edge-Computing-Assisted Multiplayer Cloud Gaming,
Dhowa, IMPALA: Scalable Distributed Deep-RL with Importance Weighted Actor-Learner Architectures,
Mitchell, Performance Evaluation of Signature Based and Anomaly Based Techniques for Intrusion Detection, https://uvic.sharepoint.com/:v:/r/sites ... 1&e=qigSsu
Thomas, Network Coding for Efficient File Transfer in Narrowband Environments. Information Technology and Control,
Kousar, SATGUARD: Concealing Endless and Bursty Packet Losses in LEO Satellite Networks for Delay-Sensitive Web Applications,
Quanwei, StarStream: Live Video Analytics over Space Networking,
Ekaba, The Akamai Network: A Platform for High-Performance Internet Applications,
Kevin, Design and Implementation of a Secure Peer-to-Peer File Transfer System Based on IP Multicast and Diffie-Hellman Algorithm,
Benjamin, A Survivable DoS-resistant Overlay Network,
Jonathan, Space/Time Trade-offs in Hash Coding for Networking Applications,
Justin, Meshtastic Infrastructure-less Networks for Reliable Data Transmission to Augment Internet of Things Applications,
Li, Cassini: Network-Aware Job Scheduling in Machine Learning Clusters,
Tom, Tarzan: A Peer-to-Peer Anonymizing Network Layer,
Isaac, Threat Detection in VANET Communications,
Parris, BitCover: Enhanced BitTorrent for interactive VoD streaming over 5G and WiFi-Direct,

pan
Posts: 58844
Joined: Mon Sep 11, 2006 10:23 am

Re: FUN projects (spring 2025)

Post by pan »

course project presentations

Name,Title,Project Video
Harper Yan,Analysis and implementation of scalable video streaming over P2P network,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=TNni4p
"Ryan Dreher, Parris Mook-Sang-Forbes, Ben Howland",Comparative analysis of performance vs security for secure file transfer protocols,
Li He,Traffic Pattern Analysis and Comparison of Distributed Deep Learning Models,
Norman Anderson,An Intelligent Transportation System (ITS) Approach to Teletraffic Engineering,
Dustin Jowsey,"Comparative analysis of WEP, WPA, WPA2, WPA3 protocols",https://uvic.sharepoint.com/:v:/r/sites ... 1&e=DlOowU
"YoungHyo Kim, Jon Edwards",Optimal Routing Protocol and Deployment Strategy for Multi-UAV Relay Networks,"https://uvic.sharepoint.com/:v:/r/sites ... 1&e=iIAMRR"
Kousar Malekinasab,Real-World Evaluation of WebRTC Using Popular Software,
Ekaba Bisong,BRLA-P2P: A Byzantine-Resistant Learning Automata Framework for Resilient Peer-to-Peer Content Distribution,
Alpar Arman,ML enhanced security in peer-to-peer overlay networks,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=x6jtMj
Phuong Pham & Jeremy Franks & Julia Ishibashi,TCP vs. UDP in Client-Server and P2P Applications,https://sites.google.com/view/csc-466-2025/demo
Emmett de St. Croix,P2P Music Streaming,https://edestcroix.ca/files/songweb-final-update.mp4
"Mathew Terhune, Holly Gummerson, and Ali Gaineshev",Optimizing resource allocation and dataflow in p2p networks using network flow algorithms,
Suhan Yoon and Sam Bokaei Ghomi,Comparative Performance Assessment of QUIC and TCP in Variable Network Conditions,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=ayBA34
Sergio Duran,TCP vs. UDP for the Secure and Efficient Transfer of Health Records in Healthcare Systems,https://sites.google.com/view/csc446pro ... tationdemo
Taha Fareed & Casper Feldmann,Comparing P2P & C/S for real time chat applications,
"Teodor Andrei Georgescu, Thomas Yasinchuk, and Baz Cox",Lightweight Sybil Attack Detection in Peer-to-Peer Network,
"Emily Martins, Yasmin Evans, and Hal Nguyen",Load-balancing techniques for Distributed Storage over the Network,
Jonathan Ami,Efficient Network Packet Filtering Using Probabilistic Hashing,
Gabriel Naranjo & Nelson Gomez,Load Balancing algorithms used in Data-center Networking,
Diyan Hu,WebRTC Analysis and Optimisation Project,
Chris McLaughlin & Ricky Lin,Performance of QUIC vs TCP for Encrypted Traffic,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=CRB6nI
Mitchell Durand,Zero Trust Network Implementation: A Comparative Analysis of Authentication Methods and Access Control,
Kevin Wai and Thomas Plant,Comparison of File Transfer Speed with Different Protocols,
Hayden Dunstan,Network Intrusion Detection with Machine Learning,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=OQOKNx
Seth Messier and Dario Monette,Comparison of Net-Code Based Solutions to Lag in Peer-to-Peer Online Games,
Tyler Trott,Decentralised Federated Learning Framework for Traffic Optimisation in Smart Cities,
"Zhang Zhang, Shiyi Zhang","Comparative Analysis of 802.11p, LTE-V2X, and NR-V2X",
Noa Arama,Statistical Analysis of Message Propagation in LEO Satellites,
Ben Towers and Taylor Hall,Neural Network for Predicting Network Failure,
"Jack Luft, Truman Gao, Quinn Webster",Bluetooth Technology,
Timon Martell,Enhancing Privacy in Peer-to-Peer Networks,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=10bjFe
"Siyu Liang, Ian Chen and Isaac Yi",Test security of Car Networks in a Connected World,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=wRV7PF
Liam Calder,DoS Alarm System,
Max Dabbs,Local Area Network Security Considerations and Techniques,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=QvdYcN
"Max van Oort, Justin Drastil, Connor Mills",LoRa-Based P2P Meshes: Congestion in the Meshtasic Network,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=osQ7pw
Mike Fei,Comparative Analysis of TCP Congestion Control Algorithms in Diverse Network Conditions,
Simon Lauer,"Advancing Smart Home Networking: Protocols, Interoperability, and Decentralization",
William Slabon,Comparison Between Methods of discovering devices Ranging from Centralized to Decentralized Approaches,
Benjamin Osalira,Resilient Overlay Network for DDoS Mitigation,
Quanwei Zhang,Decentralized Federated Learning for RSU-Centric Model Training in Intelligent Transportation Systems,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=epGy1E
Payton Webber and Dhowa Husrevoglu,Mitigating Communication Complexity in Peer-to-Peer Networks for Real-Time Applications,
Luma Cieszkiewicz,Analyzing the advantages of fully distributed command and control (C&C) infrastructure compared to centralized C&C.,
"Khushboo Chugh, Angus Bews, and Cristina Rojas",Understanding how cyber attacks exploit vulnerabilities in specific network layers using a honeypot system,https://uvic.sharepoint.com/:v:/r/sites ... 1&e=Vb70hr
Taylor Lewis,,

Post Reply

Return to “EE&CS/FEng/UVic”