i2CAT Cyber R&I
Investigation areas
Attack and defence against threats
Evaluation of systems and cyber risk
Lines of investigation
Anomaly detection
Cloud Computing
Data mining
Development of threat detection tools
Early detection of cyber risks
Fog computing
Harvesting of information on threats
Internet of Things
Mobile computing
Monitoring and profiling
Phishing & Anti-phishing
Preparation of mechanisms to respond to attacks
Risk quantification
Statistical and predictive risk analysis
Virtualization and network management