To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.

More information about cookies
Arriba

Search form

Research Map in cybersecurity
Go back

Sistemas Inteligentes y Telemática

España
Universidad de Murcia
Región de Murcia
Address: Campus de Espinardo
Contact person
Antonio Skarmeta

Investigation areas
Areas of interest Data processing Reliable and upgradeable systems Privacy Attack and defense against threats Other Metrics Critical infrastructures Identity management Promotion and awareness of safety Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis Risk management and analysis Mobile privacy-preserving applications Certification Practical (not theoretical) certifications Cybersecurity in 5G networks Cloud Computing Compliance&Certification Secure multipart computing Access control and authentication Access control based on behaviour Creation of information repositories Cryptography Risk quantification Data mining Decoys y tripwires Development of tool protection Development of methodologies for increased reliability and updating of systems Threat detection Anomaly detection Detection and removal of malware Detection and monitoring of attacks Edge Computing Preparation of mechanisms to respond to attacks Strategies for reacting to attacks Dynamic evaluation and management of risks Risk evaluation and prevention Fog computing Reliable global-level identity generation Privacy preservation monitoring tools IDS/IPS/Firewalls Internet of Things Metrics Mobile computing System modelling and system attacks Computational trust models Monitoring and profiling Network monitoring and security Privacy-aware trust negotiations Data-driven policies Privacy policies Privacy IoT privacy Secure data processing Data protection (confidentiality) Data protection (integrity and availability) Security as a service (SECaaS) Security / privacy through design Network security Digital Rights Management Solutions Identity theft Systems Compliance Environment supervision Virtualization and network management Whitelisting
Download file
Downloadable agent file
pdf
861.22 KB
Download

Do you want to participate in the Network?

Join the Network of Excellence: Become part of this community of research teams to get involved in joint initiatives and projects.
Request admission