To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Attack and defense against threats
Critical infrastructures
Lines of investigation
Large-scale data analysis
Architecture of protection
Cloud Computing
Creation of barriers to entry
Data mining
Development of automatic defences
Development of threat detection tools
Development of tool protection
Threat detection
Anomaly detection
Preparation of mechanisms to respond to attacks
IDS/IPS/Firewalls
Internet of Things
System modelling and system attacks
Network monitoring and security
Network security
Big data security
Security of mobile devices