researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
researchareas [2017/10/23 17:38] – [Research output] lallodi | researchareas [2017/11/16 15:36] – setalle | ||
---|---|---|---|
Line 8: | Line 8: | ||
===== Research output ===== | ===== Research output ===== | ||
- | ^ Research Area ^ Staff member(s) ^ Sample of output | + | ^ Research Area ^ Staff member(s) ^ Sample of output ^ |
- | | Network monitoring | Sandro Etalle, Jerry den Hartog | {{rss> | + | | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/ |
- | | Software security | Wil Michiels |{{rss> | + | * [[ http:// |
+ | </ | ||
+ | | Software security | Wil Michiels | | | ||
| Secure data management | Jerry den Hartog, Milan Petkovic, [[http:// | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http:// | ||
* [[http:// | * [[http:// | ||
Line 17: | Line 19: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Deep learning applied to cyber security | Milan Petkovic |
| [[processmining|Process mining applied to security and privacy]] | [[http:// | | [[processmining|Process mining applied to security and privacy]] | [[http:// | ||
* [[https:// | * [[https:// | ||
Line 25: | Line 27: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
- | | [[attackereconomics|Attacker economics | + | | [[attackereconomics|Attacker economics and operating environment]] |
+ | | ||
+ | * [[http:// | ||
+ | * [[https:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | </ | ||
| [[riskanalysis|Cyber-risk quantification]] | [[http:// | | [[riskanalysis|Cyber-risk quantification]] | [[http:// | ||
- | * [[http:// | + | * [[http:// |
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
- | | Identification and Authentication | Boris Skoric | + | | Identification and Authentication | Boris Skoric | |
- | | Information-theoretic security | Boris Skoric | + | | Information-theoretic security | Boris Skoric | |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen