User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
start [2017/10/23 19:32] – [TU/e Security Group] lallodistart [2017/10/23 19:33] – [TU/e Security Group] lallodi
Line 14: Line 14:
 | Software security |White-box Cryptography |Wil Michiels | | Software security |White-box Cryptography |Wil Michiels |
 | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] |
-| Data analytics for security | Deep learning applied to cyber security,\\ [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | +| Data analytics for security | Deep learning applied to cyber security,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://security1.win.tue.nl/~zannone/|Nicola Zannone]] | 
-|Attacker and risk models| [[attackereconomics|Attacker economics]],\\ [[riskanalysis|Cyber-risk quantification]]| [[http://www.win.tue.nl/~lallodi/|Luca Allodi]]|+|Attacker and risk models| [[attackereconomics|Attacker economics]],  [[riskanalysis|Cyber-risk quantification]]| [[http://www.win.tue.nl/~lallodi/|Luca Allodi]]|
 | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] |
 | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] |
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag