To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Metrics
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis
Statistical and predictive risk analysis
Risk management and analysis
Cloud and web application architecture
Legal risk assurance and management
Audits of security systems
Cyber risks
Cloud Computing
Compliance&Certification
Confidence and reliable big data
Access control and authentication
Access control based on behaviour
CPSs
Risk quantification
Regulatory security compliance
Data mining
Development of applications
Development of tool protection
Development of specific languages for data treatment
Design of security requirements
Study of patterns
Dynamic evaluation and management of risks
Risk evaluation and prevention
Implementation of security and privacy metrics in ICT
Internet of Things
Secure development languages and frameworks
Improved security in technological standards
Improvement of security protocols and standards
Methodology for the adoption of best practice and reduction of barriers in relation to risks
Secure validation methods
Methods and development of protection tools
Metrics
Integrated risk metrics and indicators
System modelling and system attacks
Data-driven policies
Data protection (confidentiality)
Data protection (integrity and availability)
Role-based Access control
Big data security
Security in critical systems (aeronautics, rail, automotive)
Economic value of personal and business data