Computer Security Lab (COSEC)
Investigation areas
Attack and defence against threats
Data processing
Evaluation of systems and cyber risk
Identity management
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Access control based on behaviour
Anomaly detection
Antivirus
Authentication protocols
Big data analysis focussed on privacy
Biometric authentication
Computation of relevant metadata
Creation of information repositories
Cryptographic authentication
Data origination
Data-driven policies
Detection and monitoring of attacks
Detection and removal of malware
Detection, identification and removal of malware propagators
Development of automatic defences
Development of data harvesting mechanisms
Development of threat detection tools
Harvesting of information on threats
IDS/IPS/Firewalls
Internet of Things
IoT privacy
Large-scale data analysis
Mechanisms for data harvesting
Mobile privacy-preserving applications
Network steganography
New types of malware
Online fraud
Privacy best practices
Privacy in the cloud
Privacy policies
Privacy preservation monitoring tools
Privacy-aware security technologies
Private communication networks
Proxies
Radio frequency identification
Security / privacy through design
Security engineering
Security intelligence
Statistical and predictive risk analysis
Study of patterns