- Platform for assessing vulnerabilities in the face of Social Engineering attacks
- Design of cybersecurity policies and plans
- Security analysis of systems and networks
- Intrusion tests
- Intrusion detection for cyber-physical systems and critical infrastructures
- Analysis and intrusions’ impact prediction
- Collecting and forensic analysis of intrusion evidence
- Identification of causes, timelines and recommendations to response to incidents
- Voting systems
- Information sharing systems with cryptographic access control
- Distributed integrity registration and contract enforcement systems (blockchain)
- Computing and reliability (Multi-party secure computation protocols)
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok