start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
start [2022/01/05 07:25] – ggankhuyag | start [2022/01/13 16:11] (current) – ggankhuyag | ||
---|---|---|---|
Line 11: | Line 11: | ||
^ Research topic ^ Core research area ^ Staff members ^ | ^ Research topic ^ Core research area ^ Staff members ^ | ||
- | | Network monitoring |Critical infrastructure protection |[[http:// | + | | Network monitoring |Critical infrastructure protection |[[http:// |
| Security for machine learning |Model cloning, Interpretability, | | Security for machine learning |Model cloning, Interpretability, | ||
| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | ||
Line 18: | Line 18: | ||
| Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | ||
| Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http:// | ||
+ | | IoT Security and Privacy |Network security protocols for IoT, Privacy-Enhancing Technologies for IoT devices and networks, Applied Security for IoT |[[https:// | ||
You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. | You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. | ||
====Teaching==== | ====Teaching==== | ||
- | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' | + | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' |
Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' | Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' | ||
Line 28: | Line 29: | ||
We are also developing the [[lab|BlackHat' | We are also developing the [[lab|BlackHat' | ||
- | Find more details on the navigation bar on the left, or contact us for specific | + | Find more details on the navigation bar on the left, or contact us for specific |
====Contacts==== | ====Contacts==== | ||
start.txt · Last modified: 2022/01/13 16:11 by ggankhuyag