Logo der Universität Wien


Master's theses


Supervision: Univ.-Prof. Dipl.-Ing. Dr. Erich Schikuta, Dipl.-Inf. Univ. Arian Bär

Title: Continuous Network Data Mining

Introduction: The analysis of big amounts of data has become a challenge for more and more fields and applications in computer science. One interesting application field of big data processing is network data analysis. Although, many approaches for processing network data already exist, the application of data mining algorithms is still in its initial phase. Therefore, the idea of this project is to apply and extend already existing data mining algorithms on network monitoring data. More precisely, we want to focus on algorithms which can run continuously on newly arriving data as they are produced by the network under study.

Description: The general frame of this thesis is the FP7 project mPlane (http://www.ict-mplane.eu/) where the general idea is to build a measurement plane for the internet, which can automatically provide insights into the performance of a network and problems therein. In the thesis project, we want to start from the import of publicly available network traces into the existing stream data warehouse DBStream[1]. The next step is to implement well known data mining algorithms and extend them it to be continuously executed over time. One of the outcomes of the thesis could be an extended version of the network anomaly detection algorithm[2], which is able to automatically detect network wide anomalies by investigating feature distributions over time. Finally, we plan to investigate how the implemented approach performs and what new insights about the imported data it can be gained.

 [1] A. Bär, A. Finamore, I. Bermudez, L. Golab, M. Mellia, P. Casas, "Technical Report: Continuous Analytics for Traffic Monitoring and Applications to CDN", FTW-TECHREPORT-129, 2013

 [2] A. D’Alconzo, A. Coluccia, and F. Ricciato, "A Distribution-Based Approach to Anomaly Detection for 3G Mobile Networks", IEEE Globecom ’09


Supervision Univ.-Prof. Dr. Stefanie Rinderle-Ma:

Topic 1: Automatic Generation an translation of Collaboration models to BPMN/XML (see C3Pro project)

Introduction: Business process management is based on the observation that each product that a company provides to the market is the outcome of a number of activities performed. Business processes are the key instrument to organizing these activities and to improving the understanding of their interrelationships [1]. Accordingly, a business process model is a series of logically related activities or tasks performed together to produce a defined set of results. The ordering between these activities in time and space represent the execution constraints between them. In general, a process model is represented as a graph where nodes represent either an activity or a gateway, and edges describe the control and data flow between them.

In the context of inter-organizational collaborations, multiple business processes interact with each other to achieve a certain goal. The motivation behind interacting business processes stems from value systems, which represent collaborations between the value chains of multiple companies. These high-level collaborations are realized by interacting business processes, each of which is run by one company in a business to business process scenario.


 In the context of the C3Pro Project, a prototype has been implemented to deal with change propagation in collaborative processes. A collaboration is implemented as several independent but interconnected graphs. These graphs have specific structure and should respect certain constraints; i.e. compatibility and consistency. The prototype evaluates and calculates the impacts of single changes (applied to one graph) on the whole collaboration (on all the connected graphs). For this endeavor, it is primordial to have a set of collaboration models to run the tests.

The aim of the project is then: (i) to implement an automatic collaboration generator that generates random collaboration models with respect to their structure and constraints. (ii) implement an automatic translator that translates the graph models into BPMN (XML) language.

 Requirements:Good programming skills, Java, XML, Graphs. 

 [1] Mathias Weske. Business Process Management : Concepts, Languages, Architectures. Springer Verlag, first edition, November 2007.

Topic 2: Implementing a web-based C3Pro editor (see C3Pro project)

 Introduction: Change is one of the main focus points in the C3Pro project, which stands for "Change and Compliance for Collaborative Processes". In collaborative processes, private processes are the individual business process models of the participating businesses. The public view or public processes abstract the private processes in such a way that only the public activities -- those where another partner is also involved -- are shown. Change in such an inter-organisational context is challenging, as a single modification from one participant in its own private process might impact some partners' related public processes, which in turn could trigger transitive changes to other partners. The correct propagation of change is an important challenge, which is being tackled on in the C3Pro Project.

 Description: We have implemented a change propagation library in the Java programming language, which takes into consideration all the changes partners have to perform for various change activities: insert, replace, and delete. Based on this library, we have implemented a desktop-based editor for visualising and simulating various change scenarios. The proposed bachelor project's goal would be implementing the same editor as a web-based prototype. Having a web-based editor for interactive change management would make the topic more accessible for everyone, allowing them to see the effects of changes in an inter-organisational context. This prototype would:

  1. Visualise choreography models as well as participating partner's public processes.
  2. Display related activities on all partners' public processes.
  3. Display the proposed changes and affected fragments (direct as well as transitive).
  4. Display statistics after applying and propagating changes.

Requirements / Programming Languages:

  •  Java (server-side) or other JVM-based languages
  •  Javascript (client-side) or other languages compiled to Javascript (HaXe, Clojurescript, Coffeescript etc.)
  • Clojure (optional, to understand the current editor)


  •  Web Services
  • HTML 5
  • Web Sockets
  • AJAX

Topic 3: Responsive-driven Security Feedback in PAIS (see project SPRINT)

Current Process-Aware Information Systems (PAIS) manage feedback for security vulnerabilities individually. If users modify process models (by e.g., inserting a task), PAIS manage the feedback of these changes in three ways. First, a system might not allow a certain action beforehand when the user is actively designing (security by design). Secondly, the change is not yet performed but there are consistency and correctness checks that would not allow its application (ex ante). Third, checks are performed after the change is applied (ex post). With these changes, users receive feedback in individual ways. Therefore, the goal is to evaluate and examine the feedback given in current PAIS. Based on that analysis, solutions for certain scenarios and a prototype are developed.

Topic 4: Process for countermeasure issuing in critical infrastructure 

In cooperation with the The AIT Austrian Institute of Technology Department Safety & Security the following Master's thesis topic is offered in the area of ICT Security.

 1.     Context of the Work

Critical infrastructures (e.g., power grids, traffic management, gas and water facilities) are of vital importance to our society. Today, attackers are using more sophisticated technologies, making existing “add-on” security solutions obsolete or insufficient, and the number of stakeholders involved –both human and machines– is always increasing. Thus, design and embedding of new security mechanisms directly into the systems is needed to drastically increase reliability and security levels, and provide higher levels of resilience.

This work is within the scope of a European research project for critical infrastructure security.

 2.     Problem Description

Novel technologies are needed for early warning detection of attacks and the issuing of countermeasures, optimised at the organizational and technical level for critical infrastructure networks. The focus of this work is on the business process research for issuing countermeasures. Your task will be to define, model, and simulate the business processes and procedures for the issuing of countermeasures using state-of-the-art open standards for process representation and automated execution, e.g., BPEL4People. The task will also include a review and selection of state-of-the-art tools for issuing of countermeasures applicable for critical infrastructure networks, following a definition of processes for anomaly/threat detection, event management, and control and mitigation subsystem models.

 3.     Required Skills

Knowledge of IT security, Skills as necessary with respect to the scope of the work, e.g., software development, process modelling and simulation


Paul Smith paul.smith@ait.ac.at

Zhendong Ma zhendong.ma@ait.ac.at

(Please inlcude stefanie.rinderle-ma@univie.ac.at in cc).

Ongoing Master's theses: 

(supervised by Univ.-Prof. Dr. Stefanie Rinderle-Ma)

  • Security Modeling in Business Processes: Empirical Research (see project SPRINT): desc
  • Implementation and Visualization of Difference Graphs for Process Mining
  • Merging of Process Views
  • Process Mining of Inter-process Constraints (see project SPRINT)
  • Process Mining of Inter-instance Constraints (see project SPRINT) desc
  • Prototype for the sonification of business process event logs (see project ADVENTURE): desc
  • Analyze Mining Results of Merged Process Views (see HuMIC project): description: desc
  • Datenbank-Schemaänderungen und ihre Auswirkungen auf XML / Relationales Mapping
  • Process Version Management
  • Mining of Processes in User Applications
  • Mining of Usage Processes in Electronic Newspapers
  • Data Quality for Process Mining

Completed Master's theses:

  • Einsatz von intelligentem Queuing zur Analyse und Optimierung von Prozessen
  • Workflow Watson - W2: A REST-ful Declarative Rule Engine As a Web Service for Workflow Support
  • ACaPlan - Adaptive Care Flow Planning
  • Konzeption und Umsetzung erweiterter Versionsverwaltungsverfahren für prozessorientierte Informationssysteme

Bachelor theses: 

open (Supervision Univ.-Prof. Dr. Erich Schikuta):

Thema: Implementierung von eLearning Komponenten in NetLuke

NetLuke ist ein interaktives eLearning System zur Visualisierung des dynamischen Verhaltens von Algorithmen und Datenstrukturen.
NetLuke wurde im Rahmen von 2 Diplomarbeiten an der RG WST entwickelt (wst.univie.ac.at/workgroups/netluke).
Ziel ist der Einsatz von NetLuke im Modul AlgoDatzur Unterstützung der Studierenden

Spezifisches Ziel der PR Arbeit(en) ist die Realisierung von Algorithmen und/oder Datenstrukturen und deren Visualisierung mit Java im NetLuke Framework.

Max. Anzahl von Studierenden: 5

InteressentInnen moegen sich bei Erich Schikuta per email (erich.schikuta@univie.ac.at) zwecks Terminvereinbarung melden.

open (Supervision Univ.-Prof. Dr. Stefanie Rinderle-Ma):

Visualization of access control models (Bachelor/Master)

Rollenbasierte Zugriffskontrollmodelle ermöglichen die Definition von Berechtigungen anhand des Rollenkonzeptes. Eine Rolle kann aus mehreren Berechtigungen bestehen. Im Rahmen der Arbeit sollen verschiedene Ansätze zur Visualisierung von Zugriffskontrollmodellen analysiert und recherchiert werden. Aufgrund der Recherche und weiteren Kriterien soll ein webbasiertes Frontend programmiert werden, dass anhand von vorgegebenen Datenformaten ein Zugriffskontrollmodell visualisiert. Dabei können mehrere Varianten unterstützt visualisiert werden.

Prozessmodelle sozialer Medien (Bachelor)
(Bis zu 2 Studierende)

Heutzutage gib es eine Vielzahl von sozialen Medien. In der Arbeit sollen mehrere exemplarisch ausgewählt werden und in Bezug auf Prozessmodelle, genutzte Daten und weiteren Aspekten analysiert werden. Dabei sollen insbesondere Prozesslandkarten, Prozessmodelle und Daten analysiert werden. Ziel ist es diese generierten Modelle dann auch in einem Workflowtool umzusetzen und zu automatisieren.



currently running (supervision Univ.-Prof. Dr. Stefanie Rinderle-Ma)

  • Sonification prototype

completed (supervision Univ.-Prof. Dr. Stefanie Rinderle-Ma)

  • Knowledge engineering of Privacy in Business Processes
  • A fully automated Single Sign-On-Solution capable of authenticating through a Third-Party Service
  • Privacy in Geschäftsprozessen
  • Process Information Elicitation Evaluation of process descriptions and comparison of description methods
  • Evaluation von organisationsbasierten Sicherheitskonzepten in AristaFlow und Activiti
  • Knowledge Engineering on Business Processes
  • Eine Analyse und Evaluierung von Sicherheitsaspekten in der Geschäftsprozessmodellierung
  • Evaluation of Security Concepts in Existing Process-Aware Information Systems
  • Evaluation of Security Extensions in Business Process Modeling
  • On Evaluating the Effort of Manual Role Mining (I)
  • On Evaluating the Effort of Manual Role Mining (II)
  • Modellierung und Simulation von Geschäftsprozessen mittels farbigen Petri-Netzen zur Analyse und zum Role-Mining von Event Logs
  • Präparation und Analyse von Prozesslogdaten für Role Engineering
  • Implementierung und Vergleich der Orgkomponenten dreier ausgewählter Prozess-Management-Systeme anhand eines Use Cases

Workflow Systems and Technology

Faculty of Computer Science
University of Vienna
Währinger Straße 29
A-1090 Vienna

T +43-1-4277-791 02
T +43-1-4277-9 791

Universität Wien | Universitätsring 1 | 1010 Wien | T +43-1-4277-0