top of page


Cyber Security and Crime Prevention
-
Intelligence Fusion
-
Reputation systems
-
L3/4 DDoS real time detection and mitigation
-
L7 DDoS real time detection and mitigation
-
Fraud real time detection and mitigation
-
Privacy Preserving Algorithms, Anonymization
-
Forensics
-
Identity Resolution
-
Look Alike
-
Behavioral Analysis and Profiling
-
Bot detection and mitigation (Web Scraping, Brute Force Login, DDoS, …)
-
Web Application Security
-
Network Security
-
Anomaly Detection in Real-Time -> Correlations -> Causal Inference
-
Predictive Analytics and Statistical Inference
-
Belief Propagation
-
Graph Algorithms
-
Matching Algorithms
-
Optimization
-
Approximation Algorithms
-
Simulations
-
Sensor Fusion
bottom of page