researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
researchareas [2017/10/23 17:21] – [Research output] lallodi | researchareas [2021/03/05 16:13] – external edit 127.0.0.1 | ||
---|---|---|---|
Line 8: | Line 8: | ||
===== Research output ===== | ===== Research output ===== | ||
- | ^ Research Area ^ Staff member(s) ^ Sample of recent | + | ^ Research Area ^ Staff member(s) ^ Sample of output ^ |
- | | Network monitoring | Sandro Etalle, Jerry den Hartog | {{rss> | + | | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/ |
- | | Software security | Wil Michiels |{{rss> | + | * [[ http:// |
- | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | [[http:// | + | * [[http://www.sciencedirect.com/ |
- | | Deep learning applied to cyber security | Milan Petkovic | + | * [[http://www.win.tue.nl/~setalle/2017_fauri_encryption.pdf | Encryption in ICS Networks: a Blessing or a Curse?]] Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle. In Proceedings of IEEE SmartGridComm 2017. |
- | | [[processmining|Process mining applied to security and privacy]] | [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | [[https:// | + | </ |
- | | [[attackereconomics|Attacker | + | | Software security | Wil Michiels | | |
- | | [[Cyber-risk quantification]] | Luca Allodi | [[http:// | + | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://zannone.win.tue.nl/ |
- | | Identification and Authentication | Boris Skoric | + | * [[http:// |
- | | Information-theoretic security | Boris Skoric | + | * |
+ | * | ||
+ | * | ||
+ | * | ||
+ | </WRAP> | ||
+ | | Deep learning applied to cyber security | Milan Petkovic | ||
+ | | [[processmining|Process mining applied to security and privacy]] | [[http://zannone.win.tue.nl/ | ||
+ | * [[https:// | ||
+ | * | ||
+ | * | ||
+ | * | ||
+ | * | ||
+ | </ | ||
+ | | [[attackereconomics|Attacker economics and operating environment]] | [[https:// | ||
+ | * [[https:// | ||
+ | * [[http://www.win.tue.nl/ | ||
+ | | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | </ | ||
+ | | [[riskanalysis|Cyber-risk quantification]] | [[http:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | </WRAP>| | ||
+ | | Identification and Authentication | Boris Skoric | | ||
+ | | Information-theoretic security | Boris Skoric | |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen