User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
start [2022/01/04 12:29] ggankhuyagstart [2022/01/13 16:11] (current) ggankhuyag
Line 11: Line 11:
  
 ^ Research topic  ^ Core research area ^ Staff members ^ ^ Research topic  ^ Core research area ^ Staff members ^
-| Network monitoring |Critical infrastructure protection |[[http://www.win.tue.nl/~setalle/|Sandro Etalle]], [[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]] | +| Network monitoring |Critical infrastructure protection |[[http://www.win.tue.nl/~setalle/|Sandro Etalle]], [[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[https://research.tue.nl/en/persons/emmanuele-zambon-mazzocato| Emmanuele Zambon-Mazzocato]] | 
-Software security |White-box Cryptography |Wil Michiels |+Security for machine learning |Model cloning, Interpretability, Backdoors |Wil Michiels |
 | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl//|Nicola Zannone]] | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http://www.win.tue.nl/~jhartog/|Jerry den Hartog]], [[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl//|Nicola Zannone]] |
 | Data analytics for security & Trustworthy AI | Deep learning applied to cyber security, Responsible and safe AI,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl/|Nicola Zannone]] | | Data analytics for security & Trustworthy AI | Deep learning applied to cyber security, Responsible and safe AI,  [[processmining|Process mining applied to security and privacy]] |[[http://www.win.tue.nl/~petkovic/|Milan Petkovic]], [[http://zannone.win.tue.nl/|Nicola Zannone]] |
Line 18: Line 18:
 | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://bskoric.win.tue.nl/|Boris Skoric]] | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http://bskoric.win.tue.nl/|Boris Skoric]] |
 | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://bskoric.win.tue.nl/|Boris Skoric]] | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://bskoric.win.tue.nl/|Boris Skoric]] |
 +| IoT Security and Privacy |Network security protocols for IoT, Privacy-Enhancing Technologies for IoT devices and networks, Applied Security for IoT |[[https://ssciancalepore.win.tue.nl/|Savio Sciancalepore]] |
  
 You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]].
 ====Teaching==== ====Teaching====
  
-We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master's levels, as well as comprehensive courses on [[http://zannone.win.tue.nl/teaching/DTM/2IMS25-17-18.html|Principles of data protection]], [[https://canvas.tue.nl/courses/19128|Attack Engineering and Cybercrime]], [[http://www.win.tue.nl/~jhartog/CourseVerif/|Verification of Security Protocols]], and [[http://bskoric.win.tue.nl/physsec/files/|Physical Aspects of Digital Security]], among several others.+We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master's levels, as well as comprehensive courses on [[http://zannone.win.tue.nl/teaching/DTM/2IMS25-17-18.html|Principles of data protection]], [[https://canvas.tue.nl/courses/19128|Attack Engineering and Cybercrime]], [[http://www.win.tue.nl/~jhartog/CourseVerif/|Verification of Security Protocols]], and [[http://bskoric.win.tue.nl/physsec/files/|Physical Aspects of Digital Security]], [[https://tue.osiris-student.nl/#/onderwijscatalogus/extern/cursus?cursuscode=2IMS30&collegejaar=2021/|Advanced Network Security]], among several others.
  
-Check out our courses at the [[bachelor|Bachelor]] and [[master|Master's]] levels! Our Master's program fits in the [[https://true-security.nl|TRU/e Master Security Programme]] in collaboration with [[http://www.ru.nl/ds/|Radboud University]].+Check out our courses at the [[bachelor|Bachelor]] and [[master|Master's]] levels! Starting from 2021-2022 TU Eindhoven offers a fully local Information Security Technology master track where all lectures are offered on the TU/e campus. The [[https://educationguide.tue.nl/programs/graduate-school/special-masters-tracks/information-security-technology/|Master of Science in Information Security Technology (IST)]] track used to be part of the "TRU/e Master in Cyber Security" which was offered in collaboration with Radboud University (RU). The last intake of the TRU/e master was in 2020-2021.
  
 We are also developing the [[lab|BlackHat's Lab (B-LAB)]] as a platform to **test nation state-level exploits, surveillance platforms, and advanced attack vectors**. The lab also has an **IoT interface** to test new (and existing) attacks against the ever-growing IoT world. We are also developing the [[lab|BlackHat's Lab (B-LAB)]] as a platform to **test nation state-level exploits, surveillance platforms, and advanced attack vectors**. The lab also has an **IoT interface** to test new (and existing) attacks against the ever-growing IoT world.
  
-Find more details on the navigation bar on the left, or contact us for specific enquiries. You can also [[https://twitter.com/security_tue|follow us on Twitter]].\\+Find more details on the navigation bar on the left, or contact us for specific inquiries. You can also [[https://twitter.com/security_tue|follow us on Twitter]].\\
 ====Contacts==== ====Contacts====
  
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag