To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Interaction with the user: usability
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Usable public key algorithms
Big data analysis focussed on privacy
Large-scale data analysis
Statistical and predictive risk analysis
Architecture of protection
Cloud and web application architecture
Search for the origin of the threat
Cloud Computing
Containment of attacks
Access control based on behaviour
Creation of barriers to entry
Cryptography
Post-quantum encryption
Data mining
Decoys y tripwires
Defence against viral attacks
Development of tool protection
Threat detection
Detection of malicious software
Early detection of cyber risks
Preparation of mechanisms to respond to attacks
Strategies for reacting to attacks
Study of patterns
Dynamic evaluation and management of risks
Decision-making management tools
Attacker identification and location
Internet of Things
Mechanisms for data harvesting
Integrated risk metrics and indicators
Network monitoring and security
Data-driven policies
IoT privacy
Secure processing of encrypted data and signals
E-mail protection
Encryption protocols for preserving privacy
Harvesting of information on threats
Network security
Big data security
Security of mobile devices
Security in critical systems (aeronautics, rail, automotive)
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Security systems adapted to usage patterns
Virtualization and network management