004 Informatik
Refine
Year of publication
Document Type
- Bachelor Thesis (51)
- Master's Thesis (34)
- Conference Proceeding (6)
- Contribution to a Periodical (5)
- Article (reviewed) (2)
- Doctoral Thesis (2)
- Book (1)
Conference Type
- Konferenzartikel (6)
Keywords
- IT-Sicherheit (12)
- JavaScript (9)
- Deep learning (5)
- Blockchain (4)
- Computersicherheit (4)
- E-Learning (4)
- HTML 5.0 (4)
- Internet der Dinge (4)
- Internet of Things (4)
- Künstliche Intelligenz (3)
- Netzwerk (3)
- Netzwerksicherheit (3)
- Reinforcement Learning (3)
- API (2)
- App <Programm> (2)
- Applikation (2)
- Bildverarbeitung (2)
- Business Intelligence (2)
- Cloud Security (2)
- Datenbanksystem (2)
- Dimension 3 (2)
- Electronic Commerce (2)
- Entwicklung (2)
- HTML (2)
- Homomorphic Encryption (2)
- Implementation (2)
- Informatik (2)
- Machine Learning (2)
- Malware (2)
- Maschinelles Lernen (2)
- Mensch-Maschine-Kommunikation (2)
- Node.js (2)
- PHP (2)
- Security (2)
- Serious game (2)
- Smartphone (2)
- Visualisierung (2)
- Web-Seite (2)
- Webentwicklung (2)
- cross-platform (2)
- iPad (2)
- jQuery Mobile (2)
- 2-Phasen-Commit (1)
- 3D (1)
- 5G (1)
- AI (1)
- AR SDK (1)
- Abenteuerspiel (1)
- Access Management (1)
- Algorithmus (1)
- Analyse (1)
- Angewandte Informatik (1)
- Anwendungsentwicklung (1)
- Anwendungsprotokoll (1)
- Anwendungsspezifischer Prozessor (1)
- App-Entwicklung (1)
- Arduino (1)
- Autoencoder (1)
- Automatisierung (1)
- Autonomie (1)
- Bautagesbericht (1)
- Bedrohung (1)
- Benchmarks (1)
- Benutzeroberfläche (1)
- Bot Classification (1)
- CBT-Modul (1)
- CMS (1)
- CSAF (1)
- Cascading Style Sheets 3 (1)
- Chain of Custody (1)
- Chiffrierung (1)
- Client-side (1)
- Cloud Computing (1)
- Cloud-Anwendungen (1)
- Code Visualisierung (1)
- Code visualization (1)
- Commerce (1)
- Compiler (1)
- Composable Commerce (1)
- Computer-Forensik-Experten (1)
- Computerforensik (1)
- Computerunterstütztes Lernen (1)
- Constrained Networks (1)
- Convolutional Neural Network (1)
- Corporate Network (1)
- Cross-Cloud-Strategie (1)
- Cyber Maturity Assessment Model (1)
- CyberDeception (1)
- DAST (1)
- DTLS (1)
- Data Provider (1)
- Data privacy (1)
- Datenbank (1)
- Datenmanagement (1)
- Datenmigration (1)
- Datenqualität (1)
- Datensicherheit (1)
- Datensicherung (1)
- Deep Learning (1)
- Deepfake (1)
- Deepfakes (1)
- Desinformation (1)
- Development (1)
- Didaktik (1)
- Digital Game Based Learning (1)
- Document Denoising (1)
- Dynamische Web-Seite (1)
- E-Commerce (1)
- E-Commerce System (1)
- Elderly care (1)
- Elektronische Bibliothek (1)
- Emotion analysis (1)
- Endgerät (1)
- Enterprise 2.0 (1)
- Entity Resolution (1)
- Entwicklungsumgebung (1)
- Erlang (1)
- Erweiterte Realität <Informatik> (1)
- Ethereum (1)
- Etylizer (1)
- Event-Marketing (1)
- Express.js (1)
- Feature extraction (1)
- Fitness (1)
- Flash (1)
- Flash CS3 (1)
- Flash CS4 (1)
- Flash CS5 (1)
- FlowNet (1)
- Flugdaten (1)
- Forensic Chain (1)
- Forensik (1)
- Framework <Informatik> (1)
- Funktionalität (1)
- Fußgängererkennung (1)
- Game Development (1)
- Gamification (1)
- Gesundheitswesen (1)
- Go <Programmiersprache> (1)
- Golang (1)
- Grain boundary (1)
- Grain growth (1)
- HTML 5 (1)
- HTML5 (1)
- HTTP (1)
- Home-Office (1)
- Homomorphe Kryptosysteme (1)
- Homomorphe Verschlüsselung (1)
- Homomorphic Encryption Schemes (1)
- Honeynet (1)
- Honeypot (1)
- Human-centered computing (1)
- Hybrid approach (1)
- Hyperparameter (1)
- IP 6 (1)
- IPv6 (1)
- ISMS (1)
- IT infrastructure library V2 (1)
- IT infrastructure library V3 (1)
- IT-Controlling (1)
- IT-Security (1)
- ITSM (1)
- Identity Management (1)
- Identity Resolution (1)
- Identitätsverwaltung (1)
- Implementierung (1)
- In-Memory (1)
- Incentivization (1)
- Industrie 4.0 (1)
- Informatiklehre (1)
- Information Security (1)
- Informationsaustausch (1)
- Informationsbeschaffung (1)
- Informationssicherheit (1)
- Informationssystem (1)
- Informationsvisualisierung (1)
- Instant Messaging (1)
- Integration (1)
- Intend-based Networking (1)
- Interaktive Medien (1)
- Internet (1)
- Island Architecture (1)
- Japanisch (1)
- JavaScript 1.5 (1)
- JavaScript Frameworks (1)
- Javascript (1)
- Kinect (1)
- Klassifikation (1)
- Kommunikation (1)
- Kommunikationsprotokoll (1)
- Komponente <Software> (1)
- Konfigurationen (1)
- Kontakt- und Kommunikationsdaten (1)
- Kornwachstum (1)
- Kryptologie (1)
- LAN (1)
- LINUX (1)
- Legacy-System (1)
- Leistungsmessung (1)
- Lichtsetzung (1)
- Link-layer-security (1)
- Listen (1)
- Lizenz (1)
- LoRaWAN (1)
- Logdatei (1)
- Lokales Netz (1)
- LwM2M (1)
- MPC (1)
- MQTT (1)
- MQTT5 (1)
- Makros (1)
- Makrosegmentierung (1)
- Marketing (1)
- Marketingstrategie (1)
- Maschinelles Sehen (1)
- Maturity Model (1)
- Maßnahme (1)
- Mediendesign (1)
- Medieninformatik (1)
- Mensch-Computer-Interaktion (1)
- Mikrocontroller (1)
- Mikrosegmentierung (1)
- Mobiles Endgerät (1)
- Mobilfunk (1)
- Multicrystalline silicon (mc-Si) (1)
- Multimedia (1)
- NDP (1)
- NDPMon (1)
- NUI (1)
- Nachhaltigkeit (1)
- Natural User Interface (1)
- Netzwerke (1)
- Neuronales Netz (1)
- NoSQL-Datenbanksystem (1)
- Node.js security (1)
- Nonlinear Regression (1)
- OSINT (1)
- Objektverfolgung (1)
- Office (1)
- Online (1)
- Online Speicher (1)
- Online Storage (1)
- Online-Portal (1)
- Online-Shop (1)
- Open Archives Initiative (1)
- Open Archives Initiative Protocol for Metadata Harvesting (1)
- Open Mobile Alliance (1)
- Open Source (1)
- Open Source Intelligence (1)
- OpenLayers (1)
- Operante Konditionierung (1)
- Optimierung (1)
- Optischer Fluss (1)
- PQC (1)
- Penetration Testing (1)
- Penetrationstest (1)
- Pflichtenheft (1)
- Phising detection (1)
- PhoneGap (1)
- Positionsschätzung (1)
- Post-Quanten Kryptographie (1)
- Produktpräsentation (1)
- Programmiersprache (1)
- Programmierung (1)
- Proof of Concept (1)
- Proximal Policy Optimization (1)
- Public-Key-Verschlüsselung (1)
- Python (1)
- Python Visualisierung (1)
- Python visualization (1)
- Quantencomputer (1)
- Quick Shop (1)
- REST-API (1)
- Ransomware (1)
- Real-time (1)
- Regression (1)
- Risikoanalyse (1)
- Risk Analysis (1)
- RoboCup3D (1)
- SAP HANA (1)
- SASE (1)
- SEND (1)
- SOC (1)
- Schwachstellenscanner (1)
- Security Advisories (1)
- Security Operation Center (1)
- Security Operation Centers (1)
- Security Operations Center (1)
- Segmentierung (1)
- Sencha Touch 2 (1)
- Sequential Model-Based Optimization (1)
- SharePoint 2010 (1)
- Sicherheit (1)
- Smart contract (1)
- Social Engineering (1)
- Social Media (1)
- Social Media Marketing (1)
- Social Workplace 2020 (1)
- Software (1)
- Software Integration (1)
- Software-Defined Access (1)
- Software-defined Networking (1)
- Softwareentwicklung (1)
- Softwaremigration (1)
- Solidity (1)
- Spiel (1)
- Spiel-Engine (1)
- Sprache (1)
- Supervised Learning (1)
- Surveillance (1)
- Synthetischer Datensatz (1)
- System Center Configuration Manager 2007 (1)
- THREE JS (1)
- TYPO3 (1)
- TYPO3 4.5 LTS (1)
- TYPO3 Multishop (1)
- Terminal (1)
- Tor (1)
- TypoScript (1)
- Täterkommunikation (1)
- Unity (1)
- Unity3d (1)
- Unsupervised Learning (1)
- Unüberwachtes Lernen (1)
- User-Interface (1)
- VANET (1)
- Verschlüsselung (1)
- Verteilter Speicher (1)
- Virtual Research Environment (1)
- Virtuelle Forschungsumgebung (1)
- Virtuelles Informatiklabor (1)
- Vuforia (1)
- Vulnerability Management (1)
- Vulnerability Tracking (1)
- Vulnerability identification (1)
- Warenpräsentation (1)
- Wars (1)
- Wassernutzung (1)
- Web Site (1)
- Web-App (1)
- Webportal (1)
- Webserver (1)
- White-Label-App (1)
- Windows Azure (1)
- World Wide Web (1)
- Zugriffskontrolle (1)
- agent (1)
- ambiguity (1)
- android-security (1)
- approximate histograms (1)
- berührungslos (1)
- blended learning (1)
- blockchain (1)
- blockchain-based system (1)
- bloom filters (1)
- computer vision (1)
- confidentiality (1)
- cyber attack (1)
- data malleability (1)
- data processing (1)
- data quality (1)
- distributed ledger (1)
- e-learning (1)
- eurocity persons (1)
- flash (1)
- gemischtes Lernen (1)
- homomorphic encryption (1)
- html5 (1)
- hybride App (1)
- hybride Lernarrangements (1)
- iPhone (1)
- informatics (1)
- interactivity (1)
- internet (1)
- legacy machines (1)
- maintenance (1)
- mitigations (1)
- multimedia (1)
- ns-3 (1)
- optimization (1)
- pedestrian detection (1)
- peer to peer network (1)
- permissions (1)
- privacy (1)
- product presentation (1)
- react Native (1)
- security (1)
- sensor node (1)
- sharding algorithm (1)
- shop floor (1)
- time series data (1)
- trust management system (1)
- tt_products (1)
- web application security (1)
- wireless sensor network (1)
- Übersetzer (1)
- Überwachtes Lernen (1)
Institute
- Fakultät Medien (M) (ab 22.04.2021) (37)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (36)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (19)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (6)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (4)
- Zentrale Einrichtungen (3)
- Fakultät Wirtschaft (W) (2)
- IMLA - Institute for Machine Learning and Analytics (1)
Open Access
- Closed Access (47)
- Open Access (28)
- Closed (26)
- Diamond (3)
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
Linux and Linux-based operating systems have been gaining more popularity among the general users and among developers. Many big enterprises and large companies are using Linux for servers that host their websites, some even require their developers to have knowledge about Linux OS. Even in embedded systems one can find many Linux-based OS that run them. With its increasing popularity, one can deduce the need to secure such a system that many personnel rely on, be it to protect the data that it stores or to protect the integrity of the system itself, or even to protect the availability of the services it offers. Many researchers and Linux enthusiasts have been coming up with various ways to secure Linux OS, however new vulnerabilities and new bugs are always found, by malicious attackers, with every update or change, which calls for the need of more ways to secure these systems.
This Thesis explores the possibility and feasibility of another way to secure Linux OS, specifically securing the terminal of such OS, by altering the commands of the terminal, getting in the way of attackers that have gained terminal access and delaying, giving more time for the response teams and for forensics to stop the attack, minimize the damage, restore operations, and to identify collect and store evidence of the cyber-attack. This research will discuss the advantages and disadvantages of various security measures and compare and contrast with the method suggested in this research.
This research is significant because it paints a better picture of what the state of the art of Linux and Linux-based operating systems security looks like, and it addresses the concerns of security enthusiasts, while exploring new uncharted area of security that have been looked at as a not so significant part of protecting the OSes out of concern of the various limitations and problems it entails. This research will address these concerns while exploring few ways to solve them, as well as addressing the ideal areas and situations in which the proposed method can be used, and when would such method be more of a burden than help if used.
The evolution of cellular networks from its first generation (1G) to its fourth generation (4G) was driven by the demand of user-centric downlink capacity also technically called Mobile Broad-Band (MBB). With its fifth generation (5G), Machine Type Communication (MTC) has been added into the target use cases and the upcoming generation of cellular networks is expected to support them. However, such support requires improvements in the existing technologies in terms of latency, reliability, energy efficiency, data rate, scalability, and capacity.
Originally, MTC was designed for low-bandwidth high-latency applications such as, environmental sensing, smart dustbin, etc. Nowadays there is an additional demand around applications with low-latency requirements. Among other well-known challenges for recent cellular networks such as data rate energy efficiency, reliability etc., latency is also not suitable for mission-critical applications such as real-time control of machines, autonomous driving, tactile Internet etc. Therefore, in the currently deployed cellular networks, there is a necessity to reduce the latency and increase the reliability offered by the networks to support use cases such as, cooperative autonomous driving or factory automation, that are grouped under the denomination Ultra-Reliable Low-Latency Communication (URLLC).
This thesis is primarily concerned with the latency into the Universal Terrestrial Radio Access Network (UTRAN) of cellular networks. The overall work is divided into five parts. The first part presents the state of the art for cellular networks. The second part contains a detailed overview of URLLC use cases and the requirements that must be fulfilled by the cellular networks to support them. The work in this thesis is done as part of a collaboration project between IRIMAS lab in Université de Haute-Alsace, France and Institute for Reliable Embedded Systems and Communication Electronics (ivESK) in Offenburg University of Applied Sciences, Germany. The selected use cases of URLLC are part of the research interests of both partner institutes. The third part presents a detailed study and evaluation of user- and control-plane latency mechanisms in current generation of cellular networks. The evaluation and analysis of these latencies, performed with the open-source ns-3 simulator, were conducted by exploring a broad range of parameters that include among others, traffic models, channel access parameters, realistic propagation models, and a broad set of cellular network protocol stack parameters. These simulations were performed with low-power, low-cost, and wide-range devices, commonly called IoT devices, and standardized for cellular networks. These devices use either LTE-M or Narrowband-IoT (NB-IoT) technologies that are designed for connected things. They differ mainly by the provided bandwidth and other additional characteristics such as coding scheme, device complexity, and so on.
The fourth part of this thesis shows a study, an implementation, and an evaluation of latency reduction techniques that target the different layers of the currently used Long Term Evolution (LTE) network protocol stack. These techniques based on Transmission Time Interval (TTI) reduction and Semi-Persistent Scheduling (SPS) methods are implemented into the ns-3 simulator and are evaluated through realistic simulations performed for a variety of low-latency use cases focused on industry automation and vehicular networking. For testing the proposed latency reduction techniques in cellular networks, since ns-3 does not support NB-IoT in its current release, an NB-IoT extension for LTE module was developed. This makes it possible to explore deployment limitations and issues.
In the last part of this thesis, a flexible deployment framework called Hybrid Scheduling and Flexible TTI for the proposed latency reduction techniques is presented, implemented and evaluated through realistic simulations. With help of the simulation evaluation, it is shown that the improved LTE network proposed and implemented in the simulator can support low-latency applications with low cost, higher range, and narrow bandwidth devices. The work in this thesis points out the potential improvement techniques, their deployment issues and paves the way towards the support for URLLC applications with upcoming cellular networks.
On a regular basis, we hear of well-known online services that have been abused or compromised as a result of data theft. Because insecure applications jeopardize users' privacy as well as the reputation of corporations and organizations, they must be effectively secured from the outset of the development process. The limited expertise and experience of involved parties, such as web developers, is frequently cited as a cause of risky programs. Consequently, they rarely have a full picture of the security-related decisions that must be made, nor do they understand how these decisions affect implementation accurately.
The selection of tools and procedures that can best assist a certain situation in order to protect an application against vulnerabilities is a critical decision. Regardless of the level of security that results from adhering to security standards, these factors inadvertently result in web applications that are insufficiently secured. JavaScript is a language that is heavily relied on as a mainstream programming language for web applications with several new JavaScript frameworks being released every year.
JavaScript is used on both the server-side in web applications development and the client-side in web browsers as well.
However, JavaScript web programming is based on a programming style in which the application developer can, and frequently must, automatically integrate various bits of code from third parties. This potent combination has resulted in a situation today where security issues are frequently exploited. These vulnerabilities can compromise an entire server if left unchecked. Even though there are numerous ad hoc security solutions for web browsers, client-side attacks are also popular. The issue is significantly worse on the server side because the security technologies available for server-side JavaScript application frameworks are nearly non-existent.
Consequently, this thesis focuses on the server-side aspect of JavaScript; the development and evaluation of robust server-side security technologies for JavaScript web applications. There is a clear need for robust security technologies and security best practices in server-side JavaScript that allow fine-grained security.
However, more than ever, there is this requirement of reducing the associated risks without hindering the web application in its functionality.
This is the problem that will be tackled in this thesis: the development of secure security practices and robust security technologies for JavaScript web applications, specifically, on the server-side, that offer adequate security guarantees without putting too many constraints on their functionality.
Though the basic concept of a ledger that anyone can view and verify has been around for quite some time, today’s blockchains bring much more to the table including a way to incentivize users. The coins given to the miner or validator were the first source of such incentive to make sure they fulfilled their duties. This thesis draws inspiration from other peer efforts and uses this same incentive to achieve certain goals. Primarily one where users are incentivised to discuss their opinions and find scientific or logical backing for their standpoint. While traditional chains form a consensus on a version of financial "truth", the same can be applied to ideological truths too. To achieve this, creating a modified or scaled proof of stake consensus mechanism is explored in this work. This new consensus mechanism is a Reputation Scaled - Proof of Stake. This reputation can be built over time by voting for the winning side consistently or by sticking to one’s beliefs strongly. The thesis hopes to bridge the gap in current consensus algorithms and incentivize critical reasoning.
The identification of vulnerabilities is an important element of the software development process to ensure the security of software. Vulnerability identification based on the source code is a well studied field. To find vulnerabilities on the basis of a binary executable without the corresponding source code is more challenging. Recent research has shown how such detection can be performed statically and thus runtime efficiently by using deep learning methods for certain types of vulnerabilities.
This thesis aims to examine to what extent this identification can be applied sufficiently for a variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. For this purpose, a dataset with 50,651 samples of 23 different vulnerabilities in the form of a standardised LLVM Intermediate Representation was prepared. The vectorised features of a Word2Vec model were then used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). For this purpose, a binary classification was trained for the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, the methodology presented allows an accurate detection of vulnerabilities, as well as a strong limitation of the analysis scope for further analysis steps.
Duplikaterkennung, -suche und -konsolidierung für Kunden- und Geschäftspartnerdaten, sog. „Identity Resolution“, ist die Voraussetzung für erfolgreiches Customer Relationship Management und Customer Experience Management, aber auch für das Risikomanagement zur Minimierung von Betrugsrisiken und Einhaltung regulatorischer Vorschriften und viele weitere Anwendungsfälle. Diese Systeme sind jedoch hochkomplex und müssen individuell an die kundenspezifischen Anforderungen angepasst werden. Der Einsatz lernbasierter Verfahren bietet großes Potenzial zur automatisierten Anpassung. In diesem Beitrag präsentieren wir für ein KMU praxisfähige, lernbasierte Verfahren zur automatischen Konfiguration von Business-Regeln in Duplikaterkennungssystemen. Dabei wurden für Fachanwender Möglichkeiten entwickelt, um beispielgetrieben das Match-System an individuelle Business-Regeln (u.a. Umzugserkennung, Sperrlistenabgleich) anzupassen und zu konfigurieren. Die entwickelten Verfahren wurden evaluiert und in einer prototypischen Lösung integriert. Wir konnten zeigen, dass unser Machine-Learning-Verfahren, die von einem Domainexperten erstellten Business-Regeln für das Duplikaterkennungssystem „identity“ verbessern konnte. Zudem konnte der hierzu erforderliche Zeitaufwand verkürzt werden.
Drohnensteuerungen sind häufig sehr komplex und verbunden mit Hardwarekontrollern. Mittels heutiger Technologien, wie zum Beispiel der künstlichen Intelligenz oder der Sensoren Technologie, können diese jedoch vermehrt modifiziert und an die Bedürfnisse der Nutzer angepasst werden. Eine der kommenden Technologien hierfür ist das Hand Capture. Das Ziel dieser Bachelorarbeit ist es, die Technologie des Hand Capture mit einfachen Mitteln zu rekonstruieren und mittels dieser eine virtuelle Drohne in einem Simulationsspiel durch drei unterschiedliche Level steuern zu können. Außerdem sollen die aktuellen Hand Capture sowie Drohnensteuerungsmöglichkeiten aufgezeigt werden. Zur Realisierung des Hand Capture werden zwei Handkontroller angefertigt, die über jeweils einen Beschleunigungssensor an jeder Hand verfügen. Diese sind verbunden mit einem Arduino Mikrocontroller, der die Beschleunigungssensoren über das I²C-Protokoll ausliest. Um die virtuelle Drohnensteuerung und deren Simulation umzusetzen, wird die Echtzeit-3D-Entwicklungsplattform Unity verwendet. Zwischen Unity und dem Arduino wird über den seriellen Port durch eine USB-Schnittstelle eine bidirektionale Kommunikation aufgebaut, über welche die ausgemessenen Werte übertragen werden können. Zuvor werden diese Werte aber noch im Arduino in Roll- und Pitchneigungen umgewandelt, sodass Unity diese einfacher als Steuerbefehle für die Drohne interpretieren kann. Das Ergebnis ist eine funktionsfähige Drohnensteuerung, welche die Grundbewegungen der Drohne abdeckt. Zusätzlich zu der Drohnensteuerung werden in Unity drei Level erstellt, die es dem Nutzer ermöglichen, die Steuerung zu erlernen und die Drohne mit hoher Geschwindigkeit zu fliegen sowie in einem großen, offenen Level zu manövrieren. Einzelne Playtests der Simulation in denen die Level problemlos bewältigt werden konnten, bestätigen, dass die Drohnensteuerung die Aspekte: Übertragungsgeschwindigkeit, Präzision, Benutzerfreundlichkeit und Anzahl der Steuer- und Eingabemöglichkeiten erfüllt und somit als eine alternative Steuerungsmöglichkeit funktioniert.