To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.

More information about cookies

Search form

Research Map in cybersecurity
Go back

Cyber-Security and Safety

País Vasco
Address: Calle Geldo
Contact person
Huáscar Espinoza

Investigation areas
Areas of interest Attacks and defense against threats Evaluation of systems and cyber risk Critical infrastructures Privacy Data processing Reliable and upgradeable systems
Lines of investigation
Statistical and predictive risk analysis Risk management and analysis Architecture of protection and resilience System architectures and resilient processes Audits of security systems Cyber risks Containment of attacks Creation of barriers to entry Regulatory security compliance Development of threat detection tools Development of data harvesting mechanisms Development of methodologies for increased reliability and updating of systems Development, launch and monitoring of convergent technologies (physical and logical, safety and cybersecurity) Threat detection Early detection of cyber risks Detection and removal of malware Design of security requirements E-commerce Cascade effect Dynamic evaluation and management of risks Information filtering Electronic evidence management Periphery infection management Risk management Secure and ubiquitous identification and authorization Security engineering Internet of things Interoperability of systems M-commerce Mechanisms for data harvesting Methods for reducing and managing complex systems Methods and development of protection tools Integrated risk metrics and indicators System modelling and system attacks Monitoring and security in networks PET for organizations and infrastructures Secure execution platforms Privacy policies Data privacy v personalization Privacy in the cloud IoT privacy Private Information Retrieval (PIR) Physical data protection Encryption protocols for preserving privacy Harvesting of information on threats Operative data and process security Security in digital services and payment methods Security and privacy in the cloud and IoT Security/privacy through design Industrial control systems in networks (water, electricity, food, transport, finance, health, etc.) Anonymity systems Techniques and tools to ensure associated cyber-physical products and processes comply with security requirements and regulations Privacy enhancing technology (PET) Usability of PET Environment supervision
Download file
Downloadable agent file
390.78 KB

Do you want to participate in the Network?

Join the Network of Excellence: Become part of this community of research teams to get involved in joint initiatives and projects.
Request admission