researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
researchareas [2017/10/24 16:26] – [Research output] lallodi | researchareas [2022/02/01 09:15] – [Research output] zannonen | ||
---|---|---|---|
Line 3: | Line 3: | ||
Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, | Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, | ||
- | Below you can find an updated list of the recent and core contributions in these area of research. | + | Below you can find an updated list of the recent and core contributions in these areas of research. |
Line 9: | Line 9: | ||
^ Research Area ^ Staff member(s) ^ Sample of output ^ | ^ Research Area ^ Staff member(s) ^ Sample of output ^ | ||
- | | Network monitoring | [[http:// | + | | Network monitoring | [[http:// |
+ | * [[ http:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[https:// | ||
+ | </ | ||
| Software security | Wil Michiels | | | | Software security | Wil Michiels | | | ||
- | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://zannone.win.tue.nl/ |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
Line 18: | Line 23: | ||
* [[https:// | * [[https:// | ||
</ | </ | ||
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Trustworthy AI and Deep learning applied to cyber security | Milan Petkovic |
- | | [[processmining|Process mining applied to security and privacy]] | [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | [[processmining|Process mining applied to security and privacy]] | [[http://zannone.win.tue.nl/ |
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
Line 26: | Line 31: | ||
* [[https:// | * [[https:// | ||
</ | </ | ||
- | | [[attackereconomics|Attacker economics and operating environment]] | [[http://www.win.tue.nl/ | + | | [[attackereconomics|Attacker economics and operating environment]] | [[https://lallodi.github.io|L. Allodi]] | < |
- | * [[https:// | + | * [[https:// |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
Line 40: | Line 45: | ||
* [[http:// | * [[http:// | ||
</ | </ | ||
- | | Identification and Authentication | Boris Skoric | | + | | Identification and Authentication | Boris Skoric |
- | | Information-theoretic security | Boris Skoric | | + | * [[ https:// |
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | </ | ||
+ | | Information-theoretic security | Boris Skoric | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | </ | ||
+ | | IoT Security and Privacy | [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | Queries in IoT Networks.]] Savio Sciancalepore, | ||
+ | * [[https:// | ||
+ | </ | ||
+ | | Social engineering | [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | </ |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen