start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
start [2021/12/30 07:38] – ggankhuyag | start [2022/01/05 07:30] – [Teaching] ggankhuyag | ||
---|---|---|---|
Line 4: | Line 4: | ||
- | The interconnectivity and pervasiveness of computers and of embedded systems are not only determining new functionalities but is also opening the way to increasingly sophisticated attacks. Indeed, in the last years, the field of security has become one of the main focuses of computer science research around the globe. The mission of the Security group (SEC) at [[https:// | + | The interconnectivity and pervasiveness of computers and of embedded systems are not only determining new functionalities but are also opening the way to increasingly sophisticated attacks. Indeed, in the last years, the field of security has become one of the main focuses of computer science research around the globe. The mission of the Security group (SEC) at [[https:// |
We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, | We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, | ||
- | Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering. | + | Our research interests are a reflection of this and span from security deployment and management to physical security and attack engineering. |
^ Research topic ^ Core research area ^ Staff members ^ | ^ Research topic ^ Core research area ^ Staff members ^ | ||
| Network monitoring |Critical infrastructure protection |[[http:// | | Network monitoring |Critical infrastructure protection |[[http:// | ||
- | | Software security | + | | Security for machine learning |
| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | ||
| Data analytics for security & Trustworthy AI | Deep learning applied to cyber security, Responsible and safe AI, [[processmining|Process mining applied to security and privacy]] |[[http:// | | Data analytics for security & Trustworthy AI | Deep learning applied to cyber security, Responsible and safe AI, [[processmining|Process mining applied to security and privacy]] |[[http:// | ||
Line 22: | Line 22: | ||
====Teaching==== | ====Teaching==== | ||
- | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' | + | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' |
- | Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' | + | Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' |
We are also developing the [[lab|BlackHat' | We are also developing the [[lab|BlackHat' | ||
- | Find more details on the navigation bar on the left, or contact us for specific | + | Find more details on the navigation bar on the left, or contact us for specific |
====Contacts==== | ====Contacts==== | ||
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag