Investigation areas

Attack and defence against threats

Evaluation of systems and cyber risk

Lines of investigation

Anomaly detection

Cloud Computing

Data mining

Development of threat detection tools

Early detection of cyber risks

Fog computing

Harvesting of information on threats

Internet of Things

Mobile computing

Monitoring and profiling

Phishing & Anti-phishing

Preparation of mechanisms to respond to attacks

Risk quantification

Statistical and predictive risk analysis

Virtualization and network management