Investigation areas
Critical infrastructures
Data processing
Evaluation of systems and cyber risk
Identity management
Metrics
Promotion and awareness of safety
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Access control based on behaviour
Audits of security systems
Big data security
Cloud and web application architecture
Cloud Computing
Compliance&Certification
Confidence and reliable big data
CPSs
Cyber risks
Data mining
Data protection (confidentiality)
Data-driven policies
Design of security requirements
Development of applications
Development of specific languages for data treatment
Development of tool protection
Dynamic evaluation and management of risks
Economic value of personal and business data
Implementation of security and privacy metrics in ICT
Improved security in technological standards
Improvement of security protocols and standards
Integrated risk metrics and indicators
Internet of Things
Large-scale data analysis
Legal risk assurance and management
Methodology for the adoption of best practice and reduction of barriers in relation to risks
Methods and development of protection tools
Metrics
Protección de datos (integridad y disponibilidad)
Regulatory security compliance
Risk evaluation and prevention
Risk management and analysis
Risk quantification
Role-based access control
Secure development languages and frameworks
Secure validation methods
Security in critical systems (aeronautics, rail, automotive)
Statistical and predictive risk analysis
Study of patterns
System modelling and system attacks