Análisis de Datos y Ciberseguridad
Investigation areas
Attack and defence against threats
Critical infrastructures
Data processing
Evaluation of systems and cyber risk
Identity management
Interaction with the user: usability
Privacy
Promotion and awareness of safety
Reliable and upgradeable systems
Lines of investigation
Access control based on behaviour
Architecture of protection
Attacker identification and location
Big data analysis focussed on privacy
Big data security
Cloud and web application architecture
Cloud Computing
Containment of attacks
Creation of barriers to entry
Cryptography
Data mining
Data-driven policies
Decision-making management tools
Decoys & tripwires
Defence against viral attacks
Detection of malicious software
Development of tool protection
Dynamic evaluation and management of risks
E-mail protection
Early detection of cyber risks
Encryption protocols for preserving privacy
Harvesting of information on threats
Integrated risk metrics and indicators
Internet of Things
IoT privacy
Large-scale data analysis
Mechanisms for data harvesting
Network monitoring and security
Network security
Post-quantum encryption
Preparation of mechanisms to respond to attacks
Search for the origin of the threat
Secure processing of encrypted data and signals
Security in critical systems (aeronautics, rail, automotive)
Security of mobile devices
Security systems adapted to usage patterns
Statistical and predictive risk analysis
Strategies for reacting to attacks
Study of patterns
Threat detection
Usable public key algorithms
Virtualization and network management