KET DE CIBERSEGURIDAD Y BLOCKCHAIN
Investigation areas
Attack and defence against threats
Critical infrastructures
Data processing
Evaluation of systems and cyber risk
Identity management
Others
Privacy
Promotion and awareness of safety
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Access control based on behaviour
Anomaly detection
Architecture of protection
Attacker identification and location
Authentication of transactions at global level
Big data analysis focussed on privacy
Big data security
Blockchain and other DLTs
Cloud and web application architecture
Cloud Computing
Communication systems resistant to programmed attacks
Compliance&Certification
Computation of relevant metadata
Confidence and reliable big data
CPSs
Creation of barriers to entry
Creation of information repositories
Cryptographic authentication
Cryptography
Cyber risks
Data protection (confidentiality)
Data sanitization and anonymization
Decision-making management tools
Design of security requirements
Detection and monitoring of attacks
Detection of malicious software
Detection protocols, system programming and prevention programmes
Development of data harvesting mechanisms
Development of methodologies for increased reliability and updating of systems
Development of threat detection tools
Digital Rights Management
Dynamic evaluation and management of risks
Early detection of cyber risks
Electronic evidence management
Encryption protocols for preserving privacy
Forensic science
Harvesting of information on threats
Improved security in technological standards
Improvement of security protocols and standards
Industrial control systems in networks (water, electricity, food, transport, finance, health, e-health, etc.)
Integrated risk metrics and indicators
Internet of Things
Interoperability of systems
IoT privacy
Large-scale data analysis
Lattice-based homomorphic encryption
Legacy systems management
Mechanisms for data harvesting
Methodology for the adoption of best practice and reduction of barriers in relation to risks
Methods and development of protection tools
Methods for reducing and managing complex systems
Monitoring and profiling
Network monitoring and security
Network security
PET for organizations and infrastructures
Physical data protection
Post-quantum encryption
Preparation of mechanisms to respond to attacks
Privacy
Privacy in the cloud
Privacy of consultations
Privacy-aware security technologies
Protección de datos (integridad y disponibilidad)
Regulatory security compliance
Reliable global-level identity generation
Resilient architectures
Risk management and analysis
Risk quantification
Scalability and interoperability of identity management solutions
Search for the origin of the threat
Secure data processing
Secure multipart computing
Secure processing of encrypted data and signals
Security / privacy through design
Security engineering
Security in critical systems (aeronautics, rail, automotive)
Security support services
Simulation of dangerous environments
Smart cities and safe cities
Statistical and predictive risk analysis
System entry and exit filters
System modelling and system attacks
Systems Compliance
Threat and attack simulation
Threat detection
Verifiable computing