Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Evaluation of systems and cyber risk

Metrics

Privacy

Reliable and upgradeable systems

Lines of investigation

Anomaly detection

Attacker identification and location

Cloud Computing

Data mining

Data sanitization and anonymization

Design of security requirements

Detection and monitoring of attacks

Development of threat detection tools

Early detection of cyber risks

Harvesting of information on threats

Implementation of security and privacy metrics in ICT

Information filtering

Large-scale data analysis

Metrics

Privacy

Privacy assessment and metrics

Privacy enhancing technology (PET)

Privacy in the cloud

Security / privacy through design

Security intelligence

Study of patterns

Threat detection

Validation of metrics