To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Privacy
Attack and defense against threats
Metrics
Critical infrastructures
Evaluation of systems and cyber risk
Lines of investigation
Large-scale data analysis
Antivirus
Mobile privacy-preserving applications
Heuristic approach
Privacy best practices
Search for the origin of the threat
Computation of relevant metadata
Computing and harvesting of metrics
Creation of barriers to entry
Data mining
Detection of malicious software
Study of patterns
Privacy assessment and metrics
System entry and exit filters
Electronic evidence management
Surveillance monitoring tools
Implementation of security and privacy metrics in ICT
Internet of Things
Mechanisms for data harvesting
Improvement of security protocols and standards
Mobile computing
System modelling and system attacks
Network monitoring and security
Onion routing
IoT privacy
Physical data protection
Proxies
Harvesting of information on threats
Private communication networks
Network security
Security of mobile devices
Smart Phones / "Bring Your Own Device"
Privacy-aware security technologies
Economic value of personal and business data