Análisis de Datos y Ciberseguridad

Investigation areas

Attack and defence against threats

Critical infrastructures

Data processing

Evaluation of systems and cyber risk

Identity management

Interaction with the user: usability

Privacy

Promotion and awareness of safety

Reliable and upgradeable systems

Lines of investigation

Access control based on behaviour

Architecture of protection

Attacker identification and location

Big data analysis focussed on privacy

Big data security

Cloud and web application architecture

Cloud Computing

Containment of attacks

Creation of barriers to entry

Cryptography

Data mining

Data-driven policies

Decision-making management tools

Decoys & tripwires

Defence against viral attacks

Detection of malicious software

Development of tool protection

Dynamic evaluation and management of risks

E-mail protection

Early detection of cyber risks

Encryption protocols for preserving privacy

Harvesting of information on threats

Integrated risk metrics and indicators

Internet of Things

IoT privacy

Large-scale data analysis

Mechanisms for data harvesting

Network monitoring and security

Network security

Post-quantum encryption

Preparation of mechanisms to respond to attacks

Search for the origin of the threat

Secure processing of encrypted data and signals

Security in critical systems (aeronautics, rail, automotive)

Security of mobile devices

Security systems adapted to usage patterns

Statistical and predictive risk analysis

Strategies for reacting to attacks

Study of patterns

Threat detection

Usable public key algorithms

Virtualization and network management