This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
start [2021/01/11 22:22] dung |
start [2022/01/13 16:11] (current) ggankhuyag |
||
---|---|---|---|
Line 4: | Line 4: | ||
- | The interconnectivity and pervasiveness of computers and of embedded systems | + | The interconnectivity and pervasiveness of computers and of embedded systems |
We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, | We believe this goal can only be achieved by investigating **the overall picture of the cybersecurity problem**, tackling the **engineering, | ||
- | Our research interests are a reflection of this and span from security deployment and management, to physical security and attack engineering. | + | Our research interests are a reflection of this and span from security deployment and management to physical security and attack engineering. |
^ Research topic ^ Core research area ^ Staff members ^ | ^ Research topic ^ Core research area ^ Staff members ^ | ||
- | | Network monitoring |Critical infrastructure protection |[[http:// | + | | Network monitoring |Critical infrastructure protection |[[http:// |
- | | Software security | + | | Security for machine learning |
| Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | | Secure data management | Access control, Trustworthy collaborative systems, Formal methods for security |[[http:// | ||
- | | Data analytics for security | Deep learning applied to cyber security, | + | | Data analytics for security |
|Attacker and risk models| [[attackereconomics|Attacker economics]], | |Attacker and risk models| [[attackereconomics|Attacker economics]], | ||
- | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// | + | | Identification and Authentication | Physical Unclonable Functions, Biometrics|[[http:// |
- | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://security1.win.tue.nl/~bskoric/|Boris Skoric]] | | + | | Information-theoretic security |Quantum Readout of Physical Unclonable Functions, Quantum Cryptography |[[http://bskoric.win.tue.nl/ |
+ | | IoT Security and Privacy |Network security protocols for IoT, Privacy-Enhancing Technologies for IoT devices and networks, Applied Security for IoT |[[https:// | ||
You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. | You can also readily browse our [[researchareas|most recent contributions]]. We also [[artefacts| share our code and datasets]]. | ||
====Teaching==== | ====Teaching==== | ||
- | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' | + | We cover most of these aspects extensively in our teaching as well, including courses on offensive computer security at the bachelor and master' |
- | Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' | + | Check out our courses at the [[bachelor|Bachelor]] and [[master|Master' |
We are also developing the [[lab|BlackHat' | We are also developing the [[lab|BlackHat' | ||
- | Find more details on the navigation bar on the left, or contact us for specific | + | Find more details on the navigation bar on the left, or contact us for specific |
====Contacts==== | ====Contacts==== | ||