researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
researchareas [2017/10/24 15:17] – [Research output] lallodi | researchareas [2021/03/05 16:13] – external edit 127.0.0.1 | ||
---|---|---|---|
Line 8: | Line 8: | ||
===== Research output ===== | ===== Research output ===== | ||
- | ^ Research Area ^ Staff member(s) ^ Sample of output | + | ^ Research Area ^ Staff member(s) ^ Sample of output ^ |
- | | Network monitoring | Sandro Etalle, Jerry den Hartog | {{rss> | + | | Network monitoring | [[http://www.win.tue.nl/~setalle/|S. Etalle]] [[http://www.win.tue.nl/ |
- | | Software security | Wil Michiels |{{rss> | + | * [[ http:// |
- | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | * [[http://www.sciencedirect.com/ |
+ | * [[http://www.win.tue.nl/~setalle/2017_fauri_encryption.pdf | Encryption in ICS Networks: a Blessing or a Curse?]] Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle. In Proceedings of IEEE SmartGridComm 2017. | ||
+ | </ | ||
+ | | Software security | Wil Michiels | | | ||
+ | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://zannone.win.tue.nl/ | ||
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
Line 17: | Line 21: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Deep learning applied to cyber security | Milan Petkovic |
- | | [[processmining|Process mining applied to security and privacy]] | [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | [[processmining|Process mining applied to security and privacy]] | [[http://zannone.win.tue.nl/ |
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
Line 25: | Line 29: | ||
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
- | </ | + | </ |
- | | [[attackereconomics|Attacker economics and operating environment]] | [[http://www.win.tue.nl/ | + | | [[attackereconomics|Attacker economics and operating environment]] | [[https://lallodi.github.io|L. Allodi]] | < |
- | * [[https:// | + | * [[https:// |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
| [[riskanalysis|Cyber-risk quantification]] | [[http:// | | [[riskanalysis|Cyber-risk quantification]] | [[http:// | ||
* [[http:// | * [[http:// | ||
Line 39: | Line 43: | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
- | </ | + | </ |
- | | Identification and Authentication | Boris Skoric | + | | Identification and Authentication | Boris Skoric | |
- | | Information-theoretic security | Boris Skoric | + | | Information-theoretic security | Boris Skoric | |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen