researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
researchareas [2017/10/24 16:25] – [Research output] lallodi | researchareas [2022/01/05 07:38] – [Research output] ggankhuyag | ||
---|---|---|---|
Line 3: | Line 3: | ||
Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, | Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, | ||
- | Below you can find an updated list of the recent and core contributions in these area of research. | + | Below you can find an updated list of the recent and core contributions in these areas of research. |
Line 9: | Line 9: | ||
^ Research Area ^ Staff member(s) ^ Sample of output ^ | ^ Research Area ^ Staff member(s) ^ Sample of output ^ | ||
- | | Network monitoring | [[http:// | + | | Network monitoring | [[http:// |
+ | * [[ http://www.win.tue.nl/ | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[https:// | ||
+ | </ | ||
| Software security | Wil Michiels | | | | Software security | Wil Michiels | | | ||
- | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://zannone.win.tue.nl/ |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
Line 18: | Line 23: | ||
* [[https:// | * [[https:// | ||
</ | </ | ||
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Trustworthy AI and Deep learning applied to cyber security | Milan Petkovic |
- | | [[processmining|Process mining applied to security and privacy]] | [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | [[processmining|Process mining applied to security and privacy]] | [[http://zannone.win.tue.nl/ |
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
Line 26: | Line 31: | ||
* [[https:// | * [[https:// | ||
</ | </ | ||
- | | [[attackereconomics|Attacker economics and operating environment]] | [[http://www.win.tue.nl/ | + | | [[attackereconomics|Attacker economics and operating environment]] | [[https://lallodi.github.io|L. Allodi]] | < |
- | * [[https:// | + | * [[https:// |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen