research_activities
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| research_activities [2017/06/21 21:48] – [Interesting Topics (Looking for New Students to keep going)] fabio.massacci@unitn.it | research_activities [Unknown date] (current) – external edit (Unknown date) 127.0.0.1 | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. | You can also find the individual research topics by looking at individual researchers who are [[security_group|members]] of the group. Each area reports its own publications and talks which you can also find in the overall [[publications|publication page]] and global [[talks|talks and tutorial page]]. | ||
| - | ==== Hot Topics | + | ==== Hotter |
| + | * [[Behavioral Biometrics]] | ||
| * [[Security Economics]] | * [[Security Economics]] | ||
| * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | ||
| - | * [[vulnerability_discovery_models|How to find and assess vulnerabilities?]] | + | * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] |
| - | * [[Risk Assessment for a Network Attack Surface]] | + | * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] |
| + | * [[https:// | ||
| - | ==== Interesting Topics | + | ==== Interesting Topics ==== |
| - | * [[testrex|Cyber | + | * [[Mobile Phone Security]] |
| - | * [[Malware Analysis]] | + | |
| * [[Practical Enforcement of Information Flow Properties]] | * [[Practical Enforcement of Information Flow Properties]] | ||
| * [[Security Requirements Engineering]] | * [[Security Requirements Engineering]] | ||
| - | * [[https:// | ||
| * [[Innovation Potential of Security Research]] | * [[Innovation Potential of Security Research]] | ||
| Line 25: | Line 25: | ||
| * [[Security-by-Contract for Mobile and Smart Card]] | * [[Security-by-Contract for Mobile and Smart Card]] | ||
| * [[Securing Access to Cloud Storage]] | * [[Securing Access to Cloud Storage]] | ||
| + | * [[https:// | ||
| * [[http:// | * [[http:// | ||
research_activities.1498074532.txt.gz · Last modified: (external edit)
