Análisis de Datos y Gestión de la Información
Investigation areas
Attack and defence against threats
Critical infrastructures
Data processing
Evaluation of systems and cyber risk
Identity management
Metrics
Lines of investigation
Access control and authentication
Anomaly detection
Cloud and web application architecture
Computing and harvesting of metrics
Detection and monitoring of attacks
Development of automatic defences
Development of threat detection tools
Development of tool protection
Fog computing
IDS/IPS/Firewalls
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Large-scale data analysis
Legacy systems management
Mechanisms for data harvesting
Methods for reducing and managing complex systems
Network monitoring and security
Network security
Protection of navigation systems (GPS)
Regulatory security compliance
Reliable global-level identity generation
Resilient architectures
Risk management and analysis
Risk quantification
Role-based access control
Security in critical systems (aeronautics, rail, automotive)
Simulation of dangerous environments
Study of patterns
System modelling and system attacks
Threat and attack simulation
Threat detection
Virtualization and network management