To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Metrics
Critical infrastructures
Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis
Cloud Computing
Data mining
Development of threat detection tools
Threat detection
Anomaly detection
Early detection of cyber risks
Detection and monitoring of attacks
Design of security requirements
Study of patterns
Privacy assessment and metrics
Information filtering
Attacker identification and location
Implementation of security and privacy metrics in ICT
Security intelligence
Metrics
Privacy
Privacy in the cloud
Harvesting of information on threats
Data sanitization and anonymization
Security / privacy through design
Privacy enhancing technology (PET)
Validation of metrics