TUM Logo

Technische Universität München (TUM) is one of the leading German universities in Engineering and Science with long standing reputation for scientific excellence. TUM scientists have been repeatedly singled out for the award of the Nobel Prize. Today, nine holders of the Leibniz Prize awarded by the German Research Council – Deutsche Forschungsgemeinschaft (DFG) – give lectures and pursue research at the Technische Universität München. In many international and national rankings, TUM ranks first among all German universities.

The Department of Informatics at TUM has a long tradition, starting lectures in computer science in 1967. Today it is one of the largest computer science departments in Germany and is regularly evaluated being among the top computer science departments in Germany. The Chair for Network Architectures and Services

The Chair for Network Architectures and Services at TUM operates a Secure Internet Laboratory. As part of this laboratory, TUM develops and operates a range of innovative components and services, including decentralized, user-controlled networks and knowledge plane mechanisms. Research activities include innovative Internet technologies, with special focus on network security, network monitoring, attack detection and defence, secure peer-to-peer and overlay networking, and negotiation of security policies over fixed and mobile network technologies.

Relevant projects are the EU FP7 project ResumeNet, with contributions towards the resilient Internet: service layer resilience, testbed and experiments; the EU FP7 SecFuNet project, addressing security for the Future Internet, the EU Celtic project AutHoNe, with contributions on Autonomic Home Networking, in particular architecture, components for automated management and monitoring, testbed and experiments, the EU Celtic project BaaS, addressing Buildings as a Service, and the German national science foundation (DFG) project LUPUS, with contributions on load transformations and their usage for traffic prediction and understanding in networks with security requirements.