Análisis de Datos y Gestión de la Información

Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Evaluation of systems and cyber risk

Identity management

Metrics

Lines of investigation

Access control and authentication

Anomaly detection

Cloud and web application architecture

Computing and harvesting of metrics

Detection and monitoring of attacks

Development of automatic defences

Development of threat detection tools

Development of tool protection

Fog computing

IDS/IPS/Firewalls

Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)

Large-scale data analysis

Legacy systems management

Mechanisms for data harvesting

Methods for reducing and managing complex systems

Network monitoring and security

Network security

Protection of navigation systems (GPS)

Regulatory security compliance

Reliable global-level identity generation

Resilient architectures

Risk management and analysis

Risk quantification

Role-based access control

Security in critical systems (aeronautics, rail, automotive)

Simulation of dangerous environments

Study of patterns

System modelling and system attacks

Threat and attack simulation

Threat detection

Virtualization and network management