To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Attack and defense against threats
Interaction with the user: usability
Identity management
Evaluation of systems and cyber risk
Lines of investigation
Biometric authentication
Access control and authentication
Access control based on behaviour
Defence against viral attacks
Development of automatic defences
Development of threat detection tools
Anomaly detection
Detection and monitoring of attacks
Preparation of mechanisms to respond to attacks
Study of patterns
Dynamic evaluation and management of risks
Reliable global-level identity generation
Human-System Interaction
System modelling and system attacks
Monitoring and profiling
Empowering user capabilities
Facial recognition
Threat and attack simulation
Security systems adapted to usage patterns
Technologies to reduce misbehaviour by users
Visualisation of techniques to facilitate intelligibility