To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Privacy
Attack and defense against threats
Other
Critical infrastructures
Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis
Audits of security systems
Privacy best practices
Risk quantification
Development of threat detection tools
Development of specific languages for data treatment
Anomaly detection
Utility information detection
Dynamic evaluation and management of risks
Digital Rights Management
Security Governance and Management
Hardware for biometrics and cryptography
Decision-making management tools
IDS/IPS/Firewalls
Security intelligence
Internet of Things
System modelling and system attacks
Network monitoring and security
Data protection (confidentiality)
Data protection (integrity and availability)
Network security
Security of mobile devices
Hardware security
Privacy-aware security technologies