researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
researchareas [2017/10/24 15:16] – [Research output] lallodi | researchareas [2017/11/16 16:33] – jhartog | ||
---|---|---|---|
Line 8: | Line 8: | ||
===== Research output ===== | ===== Research output ===== | ||
- | ^ Research Area ^ Staff member(s) ^ Sample of output | + | ^ Research Area ^ Staff member(s) ^ Sample of output ^ |
- | | Network monitoring | Sandro Etalle, Jerry den Hartog | {{rss> | + | | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/ |
- | | Software security | Wil Michiels |{{rss> | + | * [[ http:// |
+ | * [[http://www.sciencedirect.com/science/article/pii/S2214212616302629 | A white-box anomaly-based framework for database leakage detection.]] Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandor Etalle, Mykola Pechenizkiya. Journal of Information Security and Applications 32: 27-46 (2017) | ||
+ | </ | ||
+ | | Software security | Wil Michiels | | | ||
| Secure data management | Jerry den Hartog, Milan Petkovic, [[http:// | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http:// | ||
* [[http:// | * [[http:// | ||
Line 17: | Line 20: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Deep learning applied to cyber security | Milan Petkovic |
| [[processmining|Process mining applied to security and privacy]] | [[http:// | | [[processmining|Process mining applied to security and privacy]] | [[http:// | ||
* [[https:// | * [[https:// | ||
Line 25: | Line 28: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
| [[attackereconomics|Attacker economics and operating environment]] | [[http:// | | [[attackereconomics|Attacker economics and operating environment]] | [[http:// | ||
- | * [[https:// | + | * [[https:// |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
| [[riskanalysis|Cyber-risk quantification]] | [[http:// | | [[riskanalysis|Cyber-risk quantification]] | [[http:// | ||
- | * [[http:// | + | * [[http:// |
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
- | | Identification and Authentication | Boris Skoric | + | | Identification and Authentication | Boris Skoric | |
- | | Information-theoretic security | Boris Skoric | + | | Information-theoretic security | Boris Skoric | |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen