To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Attack and defense against threats
Other
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Análisis forense en la IoT
Biometric authentication
Forensic science
Computation of relevant metadata
Development of automatic defences
Development of tool protection
Development of methodologies for increased reliability and updating of systems
Descubrimiento y análisis de vulnerabilidades
Detection of malicious software
Dynamic evaluation and management of risks
Internet of Things
Methodology for the adoption of best practice and reduction of barriers in relation to risks
Mobile computing
System modelling and system attacks
New types of malware
Secure data processing
Harvesting of information on threats
Facial recognition
Network security
Security in operating systems
Security in critical systems (aeronautics, rail, automotive)
Dedicated systems
Operating systems
Técnicas de seguridad binaria