researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
researchareas [2017/11/16 16:33] – jhartog | researchareas [2021/03/05 16:13] – external edit 127.0.0.1 | ||
---|---|---|---|
Line 11: | Line 11: | ||
| Network monitoring | [[http:// | | Network monitoring | [[http:// | ||
* [[ http:// | * [[ http:// | ||
- | * [[http:// | + | * [[http:// |
+ | * [[http:// | ||
</ | </ | ||
| Software security | Wil Michiels | | | | Software security | Wil Michiels | | | ||
- | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | Secure data management | Jerry den Hartog, Milan Petkovic, [[http://zannone.win.tue.nl/ |
* [[http:// | * [[http:// | ||
* [[https:// | * [[https:// | ||
Line 22: | Line 23: | ||
</ | </ | ||
| Deep learning applied to cyber security | Milan Petkovic | | Deep learning applied to cyber security | Milan Petkovic | ||
- | | [[processmining|Process mining applied to security and privacy]] | [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | < | + | | [[processmining|Process mining applied to security and privacy]] | [[http://zannone.win.tue.nl/ |
* [[https:// | * [[https:// | ||
* [[https:// | * [[https:// | ||
Line 29: | Line 30: | ||
* [[https:// | * [[https:// | ||
</ | </ | ||
- | | [[attackereconomics|Attacker economics and operating environment]] | [[http://www.win.tue.nl/ | + | | [[attackereconomics|Attacker economics and operating environment]] | [[https://lallodi.github.io|L. Allodi]] | < |
* [[https:// | * [[https:// | ||
* [[http:// | * [[http:// |
researchareas.txt · Last modified: 2022/02/01 09:20 by zannonen