0
Jump to main content
  • Information security
  • Intrusion detection and prevention systems
  • Authorisation and authentication mechanisms
  • AI methods (e.g. clustering, anomaly-based IDS)
  • Privacy and security metrics and policies
  • Information theory/entropy/quantitative information flow analysis
  • Applied cryptography
  • Information security management and risk analysis
  • Security testing
  • Software security
  • Ethics of information security
  • Ethical hacking
  • Managing cloud-based infrastructures
  • Software-defined security
  • Mobile and smart-grid security

Projects

  • PRECYSE, EU project
  • SEMIAH, EU project