This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
researchareas [2017/10/24 15:14] lallodi [Research output] |
researchareas [2017/11/16 19:02] dfauri [Research output] |
||
---|---|---|---|
Line 8: | Line 8: | ||
===== Research output ===== | ===== Research output ===== | ||
- | ^ Research Area ^ Staff member(s) ^ Sample of output | + | ^ Research Area ^ Staff member(s) ^ Sample of output ^ |
- | | Network monitoring | Sandro Etalle, Jerry den Hartog | {{rss> | + | | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/ |
- | | Software security | Wil Michiels |{{rss> | + | * [[ http:// |
+ | * [[http://www.sciencedirect.com/ | ||
+ | * [[http://www.win.tue.nl/~setalle/2017_fauri_encryption.pdf | Encryption in ICS Networks: a Blessing or a Curse?]] Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle. In Proceedings of IEEE SmartGridComm 2017. | ||
+ | </ | ||
+ | | Software security | Wil Michiels | | | ||
| Secure data management | Jerry den Hartog, Milan Petkovic, [[http:// | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http:// | ||
* [[http:// | * [[http:// | ||
Line 17: | Line 21: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Deep learning applied to cyber security | Milan Petkovic |
| [[processmining|Process mining applied to security and privacy]] | [[http:// | | [[processmining|Process mining applied to security and privacy]] | [[http:// | ||
* [[https:// | * [[https:// | ||
Line 25: | Line 29: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
| [[attackereconomics|Attacker economics and operating environment]] | [[http:// | | [[attackereconomics|Attacker economics and operating environment]] | [[http:// | ||
- | * [[http:// | + | |
- | * [[https:// | + | |
* [[https:// | * [[https:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
| [[riskanalysis|Cyber-risk quantification]] | [[http:// | | [[riskanalysis|Cyber-risk quantification]] | [[http:// | ||
- | * [[http:// | + | * [[http:// |
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
- | | Identification and Authentication | Boris Skoric | + | | Identification and Authentication | Boris Skoric | |
- | | Information-theoretic security | Boris Skoric | + | | Information-theoretic security | Boris Skoric | |