Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Lines of investigation

Anomaly detection

Architecture of protection

Big data security

Cloud Computing

Creation of barriers to entry

Data mining

Development of automatic defences

Development of threat detection tools

Development of tool protection

IDS/IPS/Firewalls

Internet of Things

Large-scale data analysis

Network monitoring and security

Network security

Preparation of mechanisms to respond to attacks

Security of mobile devices

System modelling and system attacks

Threat detection