To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Attack and defense against threats
Evaluation of systems and cyber risk
Lines of investigation
Statistical and predictive risk analysis
Cloud Computing
Risk quantification
Data mining
Development of threat detection tools
Anomaly detection
Early detection of cyber risks
Preparation of mechanisms to respond to attacks
Fog computing
Internet of Things
Mobile computing
Monitoring and profiling
Phishing and Anti-phishing
Harvesting of information on threats
Virtualization and network management