NICS Lab. Networks, Information and Computer Security Lab

Investigation areas

Attack and defence against threats

Critical infrastructures

Identity management

Others

Privacy

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Anomaly detection

Architecture of protection

Authentication of transactions at global level

Authentication protocols

Blockchain security

Cloud Computing

Cryptographic authentication

Cryptography

Cyber-Physical Systems Security

Design of security requirements

Detection and monitoring of attacks

Detection and removal of malware

Development of integrated security environments

Development of tool protection

Digital Twins security

Encryption protocols for preserving privacy

Environment supervision

Fog computing

Intelligent Transport Systems security

Internet of Things

IoT privacy

Methods and development of protection tools

Network monitoring and security

Network security

Privacy enhancing technology (PET)

Privacy of consultations

Private communication networks

Secure computing

Secure development languages and frameworks

Secure execution platforms

Secure multipart computing

Security / privacy through design

Security in critical systems (aeronautics, rail, automotive)

Security in Industry 4.0

Situational Awareness

Smart cards

Threat detection