To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Reliable and upgradeable systems
Attack and defense against threats
Other
Critical infrastructures
Identity management
Evaluation of systems and cyber risk
Lines of investigation
Cloud and web application architecture
Audits of security systems
Cryptographic authentication
Forensic science
Secure multipart computing
Cryptography
Data mining
Development of automatic defences
Detection of malicious software
Detección y defensa ante ataques especulativos de microarquitectura
Preparation of mechanisms to respond to attacks
Information filtering
IDS/IPS/Firewalls
Improvement of security protocols and standards
System performance improvement
System modelling and system attacks
Modelos formales aplicados a ciberseguridad
Network monitoring and security
New types of malware
Secure execution platforms
Securización de arranque de sistema
Network security
Big data security
Security in operating systems