AUTOMATION OF ATTACK DETECTION |
RESEARCH CATEGORIES |
RESEARCH THEMES |
IDENTIFICATION OF SOCIAL ENGINEERING ATTACKS |
T1.1: Extraction and structuring of semantics related to phishing techniques |
T1.2: Characterisation of cyber scam techniques based on reinforcement learning and game theory |
T1.3: Investigation of deep learning techniques for phishing detection |
T1.4: Educational approaches to improve learning and prevent victimisation. |
T1.5: Profiling cyber scams using biometric trait recognition (emotions) |
FIGHT AGAINST FALSE INFORMATION |
T2.1: Collaborative expertise for the verification of information |
T2.2: Assessing the trend of information on the Web |
T2.3: Reducing the spread of false information in social networks |
T2.4 : Detection of fake documents based on graph theory structures |
CYBER RESILIENCE IoT ENVIRONMENTS |
T3.1: Detection of malicious applications in mobile OS |
T3.2: Detect and fix software vulnerabilities |
T3.3: Generation and structuring of knowledge base on attacks in IoT for their detection. |
T3.4: Automation of nodes in decision making in IoT |
T 3.5 : Security robustness based on blockchains |