To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Other
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Big data analysis focussed on privacy
Large-scale data analysis
Statistical and predictive risk analysis
Risk management and analysis
Architecture of protection
Cloud and web application architecture
Resilient architectures
Cryptographic authentication
Authentication of transactions at global level
Blockchain and other DLTs
Search for the origin of the threat
Cyber risks
Forensic science
Lattice-based homomorphic encryption
Smart cities and safe cities
Cloud Computing
Compliance&Certification
Computation of relevant metadata
Secure multipart computing
Verifiable computing
Confidence and reliable big data
Access control and authentication
Access control based on behaviour
CPSs
Creation of barriers to entry
Creation of information repositories
Cryptography
Post-quantum encryption
Risk quantification
Regulatory security compliance
Development of threat detection tools
Development of data harvesting mechanisms
Development of methodologies for increased reliability and updating of systems
Threat detection
Anomaly detection
Detection of malicious software
Early detection of cyber risks
Detection and monitoring of attacks
Design of security requirements
Preparation of mechanisms to respond to attacks
Scalability and interoperability of identity management solutions
Dynamic evaluation and management of risks
System entry and exit filters
Reliable global-level identity generation
Digital Rights Management
Electronic evidence management
Decision-making management tools
Attacker identification and location
Security intelligence
Internet of Things
Interoperability of systems
Legacy systems management
Mechanisms for data harvesting
Improved security in technological standards
Improvement of security protocols and standards
Methodology for the adoption of best practice and reduction of barriers in relation to risks
Methods for reducing and managing complex systems
Methods and development of protection tools
Integrated risk metrics and indicators
System modelling and system attacks
Monitoring and profiling
Network monitoring and security
PET for organizations and infrastructures
Privacy
Privacy in the cloud
IoT privacy
Privacy of consultations
Secure processing of encrypted data and signals
Secure data processing
Data protection (confidentiality)
Data protection (integrity and availability)
Physical data protection
Encryption protocols for preserving privacy
Detection protocols, system programming and prevention programmes
Harvesting of information on threats
Data sanitization and anonymization
Security / privacy through design
Network security
Big data security
Security in critical systems (aeronautics, rail, automotive)
Security support services
Threat and attack simulation
Simulation of dangerous environments
Communication systems resistant to programmed attacks
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Systems Compliance
Privacy-aware security technologies