To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Data processing
Reliable and upgradeable systems
Attack and defense against threats
Identity management
Evaluation of systems and cyber risk
Lines of investigation
Big data analysis focussed on privacy
Large-scale data analysis
Statistical and predictive risk analysis
Antivirus
Mobile privacy-preserving applications
Biometric authentication
Cryptographic authentication
Privacy best practices
Computation of relevant metadata
Access control and authentication
Access control based on behaviour
Creation of information repositories
Development of automatic defences
Development of threat detection tools
Development of data harvesting mechanisms
Anomaly detection
Detection and removal of malware
Detection and monitoring of attacks
Detection, identification and removal of malware propagators
Network steganography
Study of patterns
Online fraud
Privacy preservation monitoring tools
Radio frequency identification
IDS/IPS/Firewalls
Security engineering
Security intelligence
Internet of Things
Mechanisms for data harvesting
New types of malware
Data origination
Data-driven policies
Privacy policies
Privacy in the cloud
IoT privacy
Authentication protocols
Proxies
Harvesting of information on threats
Private communication networks
Security / privacy through design
Privacy-aware security technologies