researchareas
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
researchareas [2021/03/05 16:13] – external edit 127.0.0.1 | researchareas [2022/02/01 09:20] (current) – [Research output] zannonen | ||
---|---|---|---|
Line 3: | Line 3: | ||
Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, | Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, | ||
- | Below you can find an updated list of the recent and core contributions in these area of research. | + | Below you can find an updated list of the recent and core contributions in these areas of research. |
Line 9: | Line 9: | ||
^ Research Area ^ Staff member(s) ^ Sample of output ^ | ^ Research Area ^ Staff member(s) ^ Sample of output ^ | ||
- | | Network monitoring | [[http:// | + | | Network monitoring | [[http:// |
* [[ http:// | * [[ http:// | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
+ | * [[https:// | ||
</ | </ | ||
| Software security | Wil Michiels | | | | Software security | Wil Michiels | | | ||
Line 22: | Line 23: | ||
* [[https:// | * [[https:// | ||
</ | </ | ||
- | | Deep learning applied to cyber security | Milan Petkovic | + | | Trustworthy AI and Deep learning applied to cyber security | Milan Petkovic |
| [[processmining|Process mining applied to security and privacy]] | [[http:// | | [[processmining|Process mining applied to security and privacy]] | [[http:// | ||
* [[https:// | * [[https:// | ||
Line 44: | Line 45: | ||
* [[http:// | * [[http:// | ||
</ | </ | ||
- | | Identification and Authentication | Boris Skoric | | + | | Identification and Authentication | Boris Skoric |
- | | Information-theoretic security | Boris Skoric | | + | * [[ https:// |
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | </ | ||
+ | | Information-theoretic security | Boris Skoric | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[ https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | </ | ||
+ | | IoT Security and Privacy | [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | Queries in IoT Networks.]] Savio Sciancalepore, | ||
+ | * [[https:// | ||
+ | </ | ||
+ | | Social engineering | [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | </ |
researchareas.1614957231.txt.gz · Last modified: 2021/03/05 16:13 by 127.0.0.1