start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
start [2022/01/05 07:30] – [Teaching] ggankhuyag | start [2022/01/13 16:11] (current) – ggankhuyag | ||
---|---|---|---|
Line 11: | Line 11: | ||
^ Research topic ^ Core research area ^ Staff members ^ | ^ Research topic ^ Core research area ^ Staff members ^ | ||
- | | Network monitoring |Critical infrastructure protection |[[http:// | + | | Network monitoring |Critical infrastructure protection |[[http:// |
| Security for machine learning |Model cloning, Interpretability, | | Security for machine learning |Model cloning, Interpretability, | ||
| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | ||
Line 18: | Line 18: | ||
| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | ||
| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | ||
+ | | IoT Security and Privacy |Network security protocols for IoT, Privacy-Enhancing Technologies for IoT devices and networks, Applied Security for IoT |[[https:// | ||
You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. | You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. | ||
====Teaching==== | ====Teaching==== | ||
- | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' | + | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' |
Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' | Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' |
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag