Research

Cybersecurity

Two young men pose enthusiastically in a casual setting, one giving a peace sign and the other making a hand gesture, while a laptop displaying green graphics sits between them; in the background, another person holds a slice of pizza and an umbrella is visible through a window.

Network security; wireless security; applied cryptography; runtime security; intrusion detection systems; human aspects of cybersecurity; differential privacy; hardware security