To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.

More information about cookies
Arriba

Search form

Research Map in cybersecurity
Go back

COSEC - Computer Security Lab

España
Universidad Carlos III de Madrid
Comunidad de Madrid
Address: Avenida de la Universidad 30
Contact person
Arturo Ribagorda Garnacho

Investigation areas
Areas of interest Attacks and defense against threats Evaluation of systems and cyber risk Identity Management Critical infrastructures Data processing
Lines of investigation
Public administration and public services (eGov, etc.) Statistical and predictive risk analysis Application of homomorphic encryption and attribute-based encryption Application of massive data and software analysis to cybersecurity Attacks and defence against threats Attacks and defence on IoT devices Biometric authentication Cryptographic authentication Computation of relevant metadata Access control and authentication Access control based on behaviour Cryptography Applied cryptography and security protocols Risk quantification Regulatory security compliance Development of automatic defences Development of threat detection tools Development of mechanisms for monitoring, data harvesting and the detection of attacks and anomalies. Development of data harvesting mechanisms Anomaly detection Detection and advanced analysis of mobile applications Detection and analysis of malware Detection and removal of malware Detection and monitoring of attacks Design of cryptographic and biometric authentication protocols Network steganography Information filtering Radio frequency identification IDS/IPS/Firewalls Security intelligence Security intelligence: harvesting and analysis of information in threats, attack simulations Internet of Things Security mechanisms in mobile edge computing and fog computing New types of malware Privacy in mobile IoT devices and smart devices Secure data processing Data protection (confidentiality) Data protection (integrity and availability) E-commerce protection Authentication protocols Harvesting of information on threats Security for the IoT and smart devices (smartphones) Security in critical systems (aeronautics, rail, automotive) Security and privacy in IoT and medical devices Threat and attack simulation Radio frequency identification systems Identity theft Automatic technique for advanced analysis of malware: advanced obfuscation, malware in new devices, encrypted malware, dynamic analysis Techniques and models for the sharing of cybersecurity information between different entities
Download file
Downloadable agent file
pdf
458.18 KB
Download

Do you want to participate in the Network?

Join the Network of Excellence: Become part of this community of research teams to get involved in joint initiatives and projects.
Request admission