To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Attack and defense against threats
Metrics
Critical infrastructures
Identity management
Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis
Risk management and analysis
Cloud and web application architecture
Resilient architectures
Computing and harvesting of metrics
Access control and authentication
Risk quantification
Regulatory security compliance
Development of automatic defences
Development of threat detection tools
Development of tool protection
Threat detection
Anomaly detection
Detection and monitoring of attacks
Study of patterns
Fog computing
Reliable global-level identity generation
IDS/IPS/Firewalls
Legacy systems management
Mechanisms for data harvesting
Methods for reducing and managing complex systems
System modelling and system attacks
Network monitoring and security
Protection of navigation systems (GPS)
Role-based Access control
Network security
Security in critical systems (aeronautics, rail, automotive)
Threat and attack simulation
Simulation of dangerous environments
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Virtualization and network management