- Information security
- Intrusion detection and prevention systems
- Authorisation and authentication mechanisms
- AI methods (e.g. clustering, anomaly-based IDS)
- Privacy and security metrics and policies
- Information theory/entropy/quantitative information flow analysis
- Applied cryptography
- Information security management and risk analysis
- Security testing
- Software security
- Ethics of information security
- Ethical hacking
- Managing cloud-based infrastructures
- Software-defined security
- Mobile and smart-grid security
Projects
- PRECYSE, EU project
- SEMIAH, EU project
Members in the group
Participants
Associate members
- Joseph Twayigira, UiA