Cybersecurity

Awareness

  • Platform for assessing vulnerabilities in the face of Social Engineering attacks
  • Design of cybersecurity policies and plans
  • Security analysis of systems and networks

Analysis and Detection

  • Intrusion tests
  • Intrusion detection for cyber-physical systems and critical infrastructures
  • Analysis and intrusions’ impact prediction
  • Collecting and forensic analysis of intrusion evidence
  • Identification of causes, timelines and recommendations to response to incidents

Cryptography

  • Voting systems
  • Information sharing systems with cryptographic access control
  • Distributed integrity registration and contract enforcement systems (blockchain)
  • Computing and reliability (Multi-party secure computation protocols)