NICS Lab. Networks, Information and Computer Security Lab
Investigation areas
Attack and defence against threats
Critical infrastructures
Identity management
Others
Privacy
Reliable and upgradeable systems
Lines of investigation
Access control and authentication
Anomaly detection
Architecture of protection
Authentication of transactions at global level
Authentication protocols
Blockchain security
Cloud Computing
Cryptographic authentication
Cryptography
Cyber-Physical Systems Security
Design of security requirements
Detection and monitoring of attacks
Detection and removal of malware
Development of integrated security environments
Development of tool protection
Digital Twins security
Encryption protocols for preserving privacy
Environment supervision
Fog computing
Intelligent Transport Systems security
Internet of Things
IoT privacy
Methods and development of protection tools
Network monitoring and security
Network security
Privacy enhancing technology (PET)
Privacy of consultations
Private communication networks
Secure computing
Secure development languages and frameworks
Secure execution platforms
Secure multipart computing
Security / privacy through design
Security in critical systems (aeronautics, rail, automotive)
Security in Industry 4.0
Situational Awareness
Smart cards
Threat detection