research_activities
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
research_activities [2017/06/22 02:01] – fabio.massacci@unitn.it | research_activities [Unknown date] (current) – external edit (Unknown date) 127.0.0.1 | ||
---|---|---|---|
Line 7: | Line 7: | ||
==== Hotter Topics ==== | ==== Hotter Topics ==== | ||
- | * [[Biometrics]] | + | * [[Behavioral |
* [[Security Economics]] | * [[Security Economics]] | ||
* [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | * [[Validation of Risk and Security Requirements Methodologies|Empirical Methods for Security Risk Assessment]] | ||
- | * [[Vulnerability_discovery_models|How to find and assess vulnerabilities?]] | + | * [[Vulnerability_discovery_models|How to Find and Assess (Dangerous) Vulnerabilities?]] |
- | * [[Cyber Security Testbeds and Malware Testing]] | + | * [[malware_analysis|Cyber Security Testbeds and Malware Testing]] |
+ | * [[https:// | ||
==== Interesting Topics ==== | ==== Interesting Topics ==== | ||
Line 18: | Line 19: | ||
* [[Practical Enforcement of Information Flow Properties]] | * [[Practical Enforcement of Information Flow Properties]] | ||
* [[Security Requirements Engineering]] | * [[Security Requirements Engineering]] | ||
- | * [[https:// | ||
* [[Innovation Potential of Security Research]] | * [[Innovation Potential of Security Research]] | ||
Line 25: | Line 25: | ||
* [[Security-by-Contract for Mobile and Smart Card]] | * [[Security-by-Contract for Mobile and Smart Card]] | ||
* [[Securing Access to Cloud Storage]] | * [[Securing Access to Cloud Storage]] | ||
+ | * [[https:// | ||
* [[http:// | * [[http:// | ||
research_activities.1498089673.txt.gz · Last modified: (external edit)