To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Other
Metrics
Critical infrastructures
Identity management
Promotion and awareness of safety
Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis
Risk management and analysis
Mobile privacy-preserving applications
Certification
Practical (not theoretical) certifications
Cybersecurity in 5G networks
Cloud Computing
Compliance&Certification
Secure multipart computing
Access control and authentication
Access control based on behaviour
Creation of information repositories
Cryptography
Risk quantification
Data mining
Decoys y tripwires
Development of tool protection
Development of methodologies for increased reliability and updating of systems
Threat detection
Anomaly detection
Detection and removal of malware
Detection and monitoring of attacks
Edge Computing
Preparation of mechanisms to respond to attacks
Strategies for reacting to attacks
Dynamic evaluation and management of risks
Risk evaluation and prevention
Fog computing
Reliable global-level identity generation
Privacy preservation monitoring tools
IDS/IPS/Firewalls
Internet of Things
Metrics
Mobile computing
System modelling and system attacks
Computational trust models
Monitoring and profiling
Network monitoring and security
Privacy-aware trust negotiations
Data-driven policies
Privacy policies
Privacy
IoT privacy
Secure data processing
Data protection (confidentiality)
Data protection (integrity and availability)
Security as a service (SECaaS)
Security / privacy through design
Network security
Digital Rights Management Solutions
Identity theft
Systems Compliance
Environment supervision
Virtualization and network management
Whitelisting