Organization
Organization Ceit-IK4 Centro Tecnológico CARTIF CITIC – Centro Andaluz de Innovación y Tecnologías de la Información y las Comunicaciones Escuela Superior de Informática de Ciudad Real. Universidad de Castilla-La Mancha Escuela Técnica Superior de Ingeniería de Bilbao (Universidad del País Vasco) Escuela Técnica Superior de Ingeniería de Telecomunicación - Universidad Politécnica de Cartagena Escuela Técnica Superior de Ingeniería de Telecomunicación/ Universidad de Málaga Escuela Técnica Superior de Ingeniería Informática - Universidad de Sevilla ETS de Ingenieros de Telecomunicación - Universidad Politécnica de Madrid Facultad de Informática. Universidad de Murcia Fundació i2CAT, Internet i Innovació Digital a Catalunya Fundación CTIC GRADIANT (Centro Tecnológico de Telecomunicaciones de Galicia) IMDEA Software Institute Instituto de ciencias aplicadas a la ciberseguridad / Universidad de León Instituto de Tecnologías Físicas y de la Información Mondragon Unibertsitatea Mondragón Unibertsitatea (Universidad de Mondragón) PESI, Plataforma Tecnológica Española De Seguridad Industrial TECNALIA – División ICT/ESI Universidad Autónoma de Barcelona Universidad Autónoma de Madrid Universidad Carlos III de Madrid Universidad Complutense de Madrid Universidad de Alcalá de Henares Universidad de Alicante Universidad de Almería Universidad de Almería Universidad de Cantabria Universidad de Castilla La Mancha Universidad de Córdoba Universidad de Deusto Universidad de Extremadura Universidad de Girona Universidad de Granada Universidad de La Laguna Universidad de las Islas Baleares Universidad de las Palmas de Gran Canaria Universidad de León Universidad de Lérida Universidad de Málaga Universidad de Murcia Universidad de Oviedo Universidad de Salamanca Universidad de Valladolid Universidad de Vigo Universidad de Zaragoza Universidad del País Vasco Universidad del País Vasco / Euskal Herriko Unibertsitatea Universidad Europea de Madrid Universidad Internacional de La Rioja Universidad Miguel Hernández Universidad Oberta de Catalunya Universidad Politécnica de Cartagena Universidad Politécnica de Madrid Universidad Politécnica de Valencia Universidad Pública de Navarra Universidad Rey Juan Carlos Universitat Politècnica de Catalunya Universitat Pompeu Fabra Universitat Rovira i Virgili UPV/EHU
State
State País Vasco Región de Murcia Navarra Melilla La Rioja Islas Canarias Islas Baleares Castilla y León Castilla-La Mancha Cantabria Asturias Aragón Cataluña Ceuta Galicia Extremadura Comunidad Valenciana Comunidad de Madrid Andalucía
Areas
Areas Areas of interest Attack and defense against threats Attacks and defense against threats Evaluation of cyber risk systems Evaluation of systems and cyber risk Promoting safety awareness Promoting security awareness Promotion and awareness of safety Identity Management Critical infrastructures Interaction with the user: usability Metrics Privacy Data processing Protection of electronic commerce Reliable and upgradeable systems Computer attacks and cyber-attacks focus on data
Topic
Topic Adaptation of the identification process to the user Public administration and public services (eGov, etc.) Mobile agents Agents and multi-agent systems Isolation of compromised systems Isolation using hardware filters Isolation using hardware filters, isolation through visualization of services Learning algorithms Learning algorithms supervised with explanatory skills Coding and authentication algorithms Usable public key algorithms Big data analysis focussed on privacy Data analysis Large-scale data analysis Analysis of interfaces, complementary browsing systems, multi-GNSS Interference analysis Analysis of anonymous networks and application to WSN Associative risk analysis Statistical and predictive risk analysis Risk and vulnerability analysis Analysis of robustness against vulnerabilities in systems of biometric recognition, through the recreation of impersonation and obfuscation attacks Security analysis Network protocol security analysis Analysis of security and epidemic models for multiple failures (robustness of systems) Vulnerability analysis Analysis of subject behaviour to detect abnormal situations Analysis of use of facial recognition on travel documents Forensic malware analysis Forensic multimedia analysis Smart data analysis Analysis and challenges, privacy on networks, location privacy Analysis and design of information systems Analysis and management of QoS Risk management and analysis Analysis and modelling of mobile networks Analysis and planning of communication network capacity Analysis, modelling and configuration of telematic services (mobiles, multimedia, tele-education, etc.) Anonymity Anonymization of biometric data to prevent reconstruction of said data in case of robbery of the stored information (Template Protection) Anonymization of data for processing in non-trustworthy environments Applicability of ad hoc sensor systems Application of trusted engineering Application of authentication systems for the fight against networks fraud (e.g. Authentication by written signature or protection of smart card transactions) Application of generalization and noise techniques Application of machine learning and visual data analysis to engineering problems Application of homomorphic encryption and attribute-based encryption Applications of MPLS technology Application of massive data and software analysis to cybersecurity Industrial applications Mobile applications Mobile applications for maintaining privacy Mobile applications for privacy Secure mobile applications eVoting and eHealth applications Transport and logistics applications Web and database applications Rail area Architecture of protection Architecture of protection and resilience Network architecture Software architecture Cloud and web application architecture System architectures and resilient processes Reconfigurable architecture for the provision of advanced communication services Resilient architectures VoIP architecture Architectures and protocols for next-generation networks Legal risk assurance and management Aspects of security in the IaaS Attacks and defence against threats Attacks and defence on IoT devices Testing laboratory audits on identification cards Audits of security systems Anonymous authentication in mobile communications: Anonymous communication systems Biometric authentication Cryptographic authentication Authentication of ad hoc sensor systems Authentication of transactions at global level Automation of cybersecurity governance Automation of industrial processes, energy management systems and building management systems Assistance for Cybersecurity management leading to behaviour of monitored observations Big data Big data applied to security Bioinformatics Biometrics Bitcoin Specialized search engines, user modelling, human-machine interaction, advanced design of user interfaces. Business processes integration Search for the origin of the threat Search and optimization of classifiers for application in IDS: IDS/IPS/firewall Quality of service in networks Quality of service in interconnected high-performance networks. Quality of service and security of systems in the cloud Software quality Covert channels Characterization of materials for resistive commutation output Characterization of trust and reputation models. Specific models for sensor networks Certification Certification and standards in the could Digital certifications Cyber defence Cyberspace Cyber risks Ciberseguridad en infraestructuras críticas Cybersecurity and critical infrastructure resilience Science, technology and society (STS) Encryption in communications Lattice-based homomorphic encryption Digital communication circuits Reconfigurable circuits and systems on programmable chip Smart cities Smart cities and safe cities Smart and safe cities Cloud architecture/cloud computing Cloud architectures Cloud Computing Cloud data Cloud federation and interoperability Co-design hardware/software for optimization of biometric information processing Co-privacy and co-utility Linear codification in telecommunication networks. Algebraic treatment. Error correction codes Codes, privacy and combination Coding and cryptography Efficient combination of virtualization techniques with streaming and remote desktop. Secure electronic commerce Compensation of quality of service (QOS) parameters and security Optimum commitment between resulting levels of privacy and utility Quantum computing Computation of relevant metadata Computation of general proposal in GPUS Distributed asynchronous computing preserving privacy. Computation in the cloud Evolutionary computing and optimization Physiological computing Mobile computing Parallel computing Parallel and distributed computing Reconfigurable computing, embedded processors and FPGAs Secure multipart computing Social computing Social computing: social software such as collaborative calculations Ubiquitous computing Verifiable computing High performance computing and communications (HPCC) Computing and harvesting of metrics Computational number theory Computer algebra and symbolic computation Network communications Wireless communications Wireless communications: sensor networks, radio, mobile, and ad-hoc Secure group communications Secure communications, injection in network failures Confidence and reliable big data Data confidentiality Configuration of hardware filters Containment of attacks Passwords Restriction-based access control Dynamic access control Access control in virtualized environments Access control in a sensor/actuator network Access control and authentication Control of information flow Congestion control in interconnected high-performance networks. Control of quantum processes Linearization. Distributed and automated control Access control based on behaviour Access control based on behaviour Certified email and electronic notifications Firewalls, VPN, intrusion detection CPSs in Industry 4.0 Creation of barriers to entry Creation of information repositories Computational creativity Digital growth Cryptoanalysis and design of encryption flow: e-commerce protection Cryptoanalysis and design of encryption flow Cryptography Applied cryptography Applied cryptography and security protocols Attribute-based encryption Lattice-based encryption Encryption with elliptic and hyper-elliptic curves Public key encryption Distributed encryption Encryption in computationally limited devices Orderable encryption Post-quantum encryption Cryptography and cryptographic protocols Homomorphic cryptosystems, delegation of computing Cryptography and security in communications Risk quantification Compliance with security policies, starting with heterogeneous source events Regulatory security compliance Regulatory security compliance Cyberattacks detection: Detection of cyberattacks from network parameter behavioural monitoring Data mining Data mining: exploitation of stored data in relation to monitored domains through their behaviour and network response to extract information that is useful to the final user. Data science y security analytics Decoys y tripwires Defence against viral attacks Definition of evaluation metrics for security of nodes connected to the network Definition of isolation and recovery policies Definition of a paradigm called “trust@run.Time” Delay/disruptive tolerant networks Development of applications Development of secure cloud applications Development of mobile applications Development of secure applications Development of security architectures for information and communication systems Development of automatic defences Development of international standards Development of forensic analysis and program validation tools Development of threat detection tools Development of tool protection Development of privacy Development of specific languages for data treatment Development of mechanisms for monitoring, data harvesting and the detection of attacks and anomalies. Development of data harvesting mechanisms Development of methodologies for increased reliability and updating of systems Development of methodologies for increased reliability Development of methodologies for increased reliability and updating of systems Development of microelectronics Development of industrial cybersecurity management models in automation and control systems (SCADA, etc.) and in security systems (corporate, security), maturity management model in industrial cybersecurity systems Development of experimental platforms (software and hardware) for mobile and wireless communications. Platforms for mobile communications Development of service prototypes for the information society Development of wireless sensor networks Development of wireless sensor networks Development of streaming services (video on demand, internet radio, etc.) Development of model-driven software Development of a framework for developers to include trust and reputation in the design of services Development and computational implementation of mathematic models to simulate the viral spread of malware in all kinds of environments Development, launch and monitoring of convergent technologies (physical and logical, safety and cybersecurity) Development of plugins to increase privacy Threat detection Anomaly detection Detection of intrusions, proxies, firewalls, access control Intrusion detection Detection of intrusions and anomalies and early warning Detection of non-reliable samples in biometric recognition system Detection of keywords in voice Detection of malicious software Detection of life and anti-spoofing Detection in networks and distributed systems Early detection of cyber risks Detection and advanced analysis of mobile applications Detection and analysis of malware Detection and removal of malware Detection and monitoring of attacks Detection and monitoring of attacks Facial detection and tracking, estimation of posture and alignment Dimensioning of networks through techniques and algorithms adapted to the particular characteristics of the network Design of cloud architectures Design of pseudo-random generators for flow encryption Design of adaptive hardware Design of PID controller tuning tools Design of anonymization metrics Design of new network architectures that include security as a native element Design of cryptographic and biometric authentication protocols Design of security requirements Design of multi-variable control systems Design of heterogeneous hardware-software systems Design of solutions based on security methodology and privacy by design Design and implementation of anti-phishing authentication protocols on smartphones: Phishing and anti-phishing Design and analysis of cryptographic protocol Design and analysis of cryptographic systems in vehicular networks Design and system components Design and cryptanalysis of systems for the encryption of text, image and voice Design and development of embedded systems for identification of persons Design and evaluation of parallel architectures Design, evaluation and implementation of cryptographic algorithms and protocols Design, modelling and simulation of bandwidth access networks Identification devices (in particular smartcards and RFID) Distance-bounding protocols Quantum distribution of keys DNIe Teaching of degree and postgraduate courses and training and outreach seminars e-Administration E-commerce E-health: la tele-care, la tele-medicine, e-inclusion, improvement of personal autonomy, monitoring, simulation and health information systems EAOW – Computer assisted learning with hypermedia/multimedia and web-based systems Digital ecosystems Edge and Fog privacy in the cloud Cascade effect Preparation of mechanisms to respond to attacks Electronics Cloud and IoT electronics Dynamic routing for RFC4838 DTN networks Secure routing for delay and disruption-tolerant networks Computer assisted learning Scalability and interoperability of identity management solutions Scalability and interoperability of identity management solutions Formal specifications Lattice-based encryption schemes Post-quantum encryption schemes Secret-sharing schemes Standardization of biometric identification systems (ISO/IEC JTC1 SC17 y SC37; CEN TC224 Biometric standardization Network steganography Event and network-based control strategies Privacy-protection strategies Strategies for reacting to attacks Algebraic structures Search structures and schemes for the storage and recovery of chains and characters at distances to evaluate similarity Study of patterns Evaluation of threats in new paradigms Evaluation of compliance with new international standards Evaluation of interoperability of identification systems Evaluation of biometric security systems Evaluation of possibilities presented by different multi-dimensional data structures in the associative search fields Evaluation of performance in biometric data capture, both at performance and security level Dynamic evaluation of trust Evaluation and detection of attacks on identification systems, both impersonation and obfuscation Dynamic evaluation and management of risks Process evaluation and improvement Risk evaluation and prevention Face detection in images and videos Face recognition and search in images and videos Federated identity Information filtering Content filtering and anti-spam solutions System entry and exit filters Digital signature Electronic signing of contracts Group signatures, ring signatures, attribute-based signatures Fog computing Forensic science FPGA Design Methodology Fundamentals of encryption Fusion of biometric modes Reliable global-level identity generation Digital certificate management Key and certificate management (KPI) Data and knowledge management on the semantic web Evidence management Electronic evidence management Management of large volumes of data: integration of heterogeneous data, warehouse data and data mining. Management of open and big data, simulation and provision/visualization of results Management of bilateral identity Identity access management (IAM) Management of bilateral identity Information security management Periphery infection management Bandwidth access network management Interconnected high-performance network management Management of networks, services and applications, metadata, xml, web services, grid Risk management IT service management Knowledge and digital company management Management of human security factor and cybersecurity (insider threats). Models for evaluating the security risks relating to persons (internal staff, subcontractors, customers) Efficient management of HSM devices in cloud environments Network management and monitoring. Traffic analysis Management and secure transmission of personal data Grouping-proofs Advanced supervision tools Feasibility analysis tools Threat detection tools Decision-making management tools Monitoring tools Surveillance monitoring tools Tools for processing encrypted information for big data Tools for the secure processing of encrypted signals Tools for the secure processing of information in big data environments High performance computing (HPC) clouds Human computer interaction – virtual reality R&D evaluation of interoperability of data and and identification processes between platforms Identity in intercloud environments Identity in ad hoc sensor systems Partial identity Identification of the security and trust requirements for the definition of the previous framework Radio frequency identification Secure and ubiquitous identification and authorization Biometric facial identification and verification Written signature identification and verification Speaker identification and verification IDS/IPS/Firewalls Graphic IT and human-machine interface (HCI-IPO) Image classification Image hashing: obtaining hashes of images to detect altered images Image-based automatic categorization of web domains, in this case using images presented on websites to carry out said categorization Implementation of privacy and utility metrics Implementation of security and privacy metrics in ICT Increase of the reliability in existing systems Information and data protection Informatics in support of the handicaps Forensic information Public-key infrastructures and use of digital signature Cloud infrastructures and platforms Security engineering Information system engineering Traffic and quality of service engineering Software engineering Graphic computing engineering Inverse engineering Knowledge-based integration Integration of biometry in smart cards and identification devices Integration of technological developments in security in industry (manufacturing, energy, chemistry, utilities network - gas, water, etc.) and transport and communication infrastructures. Integration of ad hoc sensor systems Integration of systems Integration of facial recognition solutions on multiple platforms Secure integration Secure integration of ad hoc sensor systems Integrity of multimedia objects Integrity and availability of data Environmental intelligence: energy efficiency, intelligent environments, automatic acquisition of knowledge, multi-modal adaptive interfaces, artificial language and vision technologies Applied ICA and computational intelligence Security intelligence Security intelligence: harvesting and analysis of information in threats, attack simulations User interaction: usability Human-machine interaction in identification systems User-system interaction Key exchange Lawful interception of communications Internet of Things Internet of Things and critical infrastructure Internet of Things and cyber-physical systems Internet of things Interoperability of systems Interoperability between architecture and security Interoperability of open data Interrogation of global information systems IoT-forensics SEOOS - Software engineering and object oriented systems and information security (Java, C++) IT security governance ITC project management Remote laboratories Programming languages Secure development languages and frameworks LFSR in extended bodies: M-commerce protection Linked data Private location through homomorphic encryption in geolocation M-commerce Encrypted management of identity Management of identity Discreet mathematics Mechanisms for identifying users of solutions and devices and traceable registration of these identifications Mechanisms for data harvesting Mechanisms for data recovery Mechanisms for reacting to attacks Security mechanisms in mobile edge computing and fog computing Security and encryption mechanisms (both in public-key and in secret) Improved security in technological standards Improvement of security protocols and standards Process improvement System performance improvement Metaheuristics and advanced algorithms Evaluation methodology for identification systems: performance, security and usability, since 2008 Methodology for defining metrics Methodology for the adoption of best practice and reduction of barriers in relation to risks Testing methodologies and techniques Strong identification methods Secure validation methods Heuristic methods of identification of malware on conventional computers and cloud systems Methods for reducing and managing complex systems Methods and development of protection tools Methods and technology for software development Metrics Accountability metrics on the cloud Integrated risk metrics and indicators Micro aggregation and k-anonymity Data mining Mobile computing Biometric models: iris, hand geometry, vascular, signature, fingerprint, etc. Web application modelling (WAM) System modelling System modelling and system attacks System modelling and system attacks Modelado del comportamiento basado en aprendizaje automático Human-machine interaction modelling HVAC system control modelling Computational trust models Security policy annotation models on business processes Software development models in SI and CI Epidemiological models for the propagation of attacks on wireless sensor networks: System modelling and of attacks on systems Monitoring Monitoring and security in networks Monitoring and security in networks Monitoring through out-of-band channels Automatic monitoring and detection of violations of security policy around business processes System monitoring and alert Monitoring and profiling Multi-biometrics: multi-mode, multi-sensor, multi-algorithm, both in fusion and complexity Multilingualism, automatic question response systems, information portals Multimedia security New communication technologies New transmission technologies and systems New types of malware Object retrieval: recovery of objects in large image harvests Onion routing Open data Open data and big data Optimization of biometric recognition algorithms for mobile devices Optimization of complex systems Owner-transfer protocols Security parameters Active participation on national and international normalization committees relating to identification technologies: ISO/IEC JTC1 SC17 y SC37; CEN TC224; AEN CTN71 SC17, SC27 y SC37 Password-based authentication Security architecture patterns Electronic tolls PET for organizations and infrastructures Secure execution platforms Privacy policies Preservation of anonymity of data captured in biometric system evaluation processes Data privacy v personalization Differential privacy Privacy on mobile phones Privacy in the cloud Privacy in mobile IoT devices and smart devices IoT privacy Privacy of Tele-medicine Privacy of consultations Privacy of localization-based services Privacy and data protection Private Information Retrieval (PIR) Processing of corrupt files Processing of signal and data in encrypted domains Processing of signals Distributed and non-linear processing Secure processing of data based on hardware (HSM or Hardware Security Module) and software (homomorphic encryption) Secure processing of encrypted data and signals Processing of images and artificial vision. Applications of telemetry, industrial robotics, biomedicine Multimedia processing (images, signals and video) Secure data processing Linear and algorithm programming Parallel and distributed programming Promotion of standards that assist interoperability between solutions and platforms Promotion of the independent evaluation of solutions and their certification Viral spread of malware Database protection Data protection Data protection (confidentiality and integrity) Data protection (confidentiality) Data protection (integrity and availability) Genomic data protection Data protection via software and hardware in non-trustworthy environments Identity protection Biometric template protection Protection of navigation systems (GPS) E-commerce protection M-commerce protection Physical data protection Protection and restoration of networks Encryption protocols Encryption protocols for preserving privacy Encryption protocols for 3D objects and images Anonymity protocols Authentication protocols Communication protocols Mobile network protocols Secure protocols Secure electronic voting protocols Testing of applications with relational databases: evaluation of coverage and effectiveness of testing, generation and reduction of databases for testing Testing of service oriented applications (SOA): web service (WS-BPEL) and web transactions Software testing Testing in the area of big data engineering: NoSQL, transactions, MapReduce Harvesting of information on threats Context-based recommendations Biometric recognition by signature and gait Recovery of information regarding attacks Mobile wireless network (MWN) Networks 4G networks 5G, relay networks Drone-based networks Complex networks Community networks Computer and smart environment networks Computer and security networks Private communication networks Distributed computer system networks Sensor networks Heterogeneous mobile and wireless communication networks. Wireless networks Ad hoc mobile networks Neuronal and genetic algorithm networks: search and classification problems in artificial intelligence Peer-to-peer networks SND networks Social media Vehicular networks Automatic response and early warning Automatic response (redundancy) Role-based Access control Data sanitization and anonymization Security in ad hoc routing Biometric protection: processing, storage, communication, detection of reliable sample, etc. Close monitoring of the Data Protection Act (LOPD) both in terms of identification processes and the evaluation of biometric solutions Security/privacy through design Security through NVF/SDN Ad hoc security Model-based security Hardware-based security Language-based security Data security Operative data and process security Security of information Security of information and applied encryption Communication and information security (CIS) Communication security Security of IoT systems and mobile devices Network security IT system security System and network security Software security Mathematically demonstrable security Big data security Security of mobile devices Security of distribution of multimedia content through P2P systems Security of internet access Big data security Security in emergencies Internet security Infrastructure security Security for the IoT and smart devices (smartphones) Cloud security Communication security VANET security Security of mobile devices Security of mobile scenarios (ad-hoc networks, vehicular networks, smart spaces) Security of QR-based security Network security Data network security Wireless network security Security in digital services and payment methods Security in cyber-physical systems Security in cyber-physical systems Security in critical systems Security in critical systems (aeronautics, rail, automotive) Security in critical systems (aeronautics, rail, automotive) Security in critical systems (rail) Security in information systems Security in multi-cast transmissions Information security Information security and the web IT security in critical infrastructures perimeter security Web security Security and quality of service in wireless communications Security and quality of data networks Information security and trust Security and computer criminology Security and defence Security and privacy of multimedia content Security and privacy of open networks Security and privacy in the cloud and IoT Security and privacy in IoT and medical devices Security and privacy on social media Security, authenticity and integrity of transmitted information Security/privacy through design IT attack insurance Self-diagnosis and system repair Self-diagnosis and system repairs. Damage diagnosis. Semantic web technologies Advanced communication services Services based on localization Audio/video services for wireless networks in infrastructure and MANETs Wireless data services Interactive digital TV services Emerging audio/video services in the internet of the future Services, applications and use cases: e-health, biomedical information systems Threat and attack simulation Attack simulation through game theory Environment simulation Computation grid environment simulation Simulation in sustainable environment Single use authentications Smart parking system Authentication system based on sensor networks with privacy Industrial control systems in networks (water, electricity, food, transport, finance, health, etc.) System of reputation and trust Systems based on the retrieval of information Centralized systems and distributed systems Reliable systems Cryptographic systems Natural language analysis systems: automatic generation of résumés, automatic categorization of documents, disambiguation of terms Anonymity systems Anonymous authentication systems Communication systems for providing advanced services in transport systems Secure communication systems Vehicular communication systems High granularity access control systems Industrial control systems in networks Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.) Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.) Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.), in particular in transport and the rail sector Identity management systems and access control Radio frequency identification systems Information systems Information systems and distributed and heterogeneous databases Information systems, design and components Non-repudiation systems between peers Biometric recognition systems on mobile platforms Biometric recognition systems on mobile platforms with both live and latent sample Biometric recognition systems Tele-medicine system, e-health and protection Real-time systems Intelligent transport and infrastructure systems Intelligent transport systems (ITS) Intelligent transport systems (ITS) Dedicated systems Distributed systems Intelligent distributed systems Electronic systems Embedded and mobile systems Intelligent knowledge-based systems Interoperable systems IoT systems for Industry 4.0 Multi-purpose systems Operating systems Secure electronic ticket and coupon systems Security management and security audit systems and methodology Skin detection: detection of areas containing skin in image and videos Smart cards Smart cities Smart Phones / "Bring Your Own Device" Smart – cards Smartphone (device and network security) Smartphones Smartphones / Bring your own device Smartphone as standard electronic component Social web 2.0 Societal impacts of surveillance technologies Soft computing Object-oriented software Software-as-a service & cloud computing environments Soluciones basadas en algoritmos soft-computing Cryptographic solutions for corporate and academic environments Identification solutions on mobile devices, since 2009 Multi-platform identification solutions Biometric recognition solutions Identity theft Cyber-risk compliance systems Research cards Smart cards Automatic technique for advanced analysis of malware: advanced obfuscation, malware in new devices, encrypted malware, dynamic analysis Advanced modelling techniques and dynamic system simulation Advanced data transmission techniques (codification of channel and cryptography) Malware detection and concealment techniques Assurance techniques Techniques and tools to ensure associated cyber-physical products and processes comply with security requirements and regulations Techniques and models for the sharing of cybersecurity information between different entities Educational technology Privacy enhancing technology (PET) Web technologies and new internet services Algebraic code theory Computation theory. Finite and quantum automata Signal and communication theory Text-based automatic categorization of web domains: classification of websites in categories relating to cybercrime, based on textual content Texture retrieval: description, consultation and retrieval of texture in images and videos The search for textures helps us find materials or surfaces in large collections of images Theoretical computer science Electronic tickets Usability of PET Usability of authentication systems Usability in biometric recognition and anti-fraud systems Usability and accessibility in identification systems Use of smart cards to preserve privacy of personal data, increasing the security of the system in the identification process Use of cards, tokens and/or biometric solutions in systems where the identification of citizens is required Use of the smart card technology and contactless interfaces for identification systems on mobiles (for example NFC) Video fingerprint: obtaining video signatures to detect similar videos, copies of videos and also to carry out searches for segments of videos within another longer one. Video summarization: creation of “visual résumés” from video content based on key frames Supervision of cognitive patients Environment supervision Virtualization and network management Artificial vision Artificial vision (intelligent supervision) Digital voting and democracy Watchdog Semantic Web Wireless sensor network Wireless, mesh and vehicular networks