top of page

Cyber Security and Crime Prevention

  • Intelligence Fusion

  • Reputation systems

  • L3/4 DDoS real time detection and mitigation

  • L7 DDoS real time detection and mitigation

  • Fraud real time detection and mitigation

  • Privacy Preserving Algorithms, Anonymization

  • Forensics

  • Identity Resolution

  • Look Alike

  • Behavioral Analysis and Profiling

  • Bot detection and mitigation (Web Scraping, Brute Force Login, DDoS, …)

  • Web Application Security

  • Network Security

  • Anomaly Detection in Real-Time -> Correlations -> Causal Inference

  • Predictive Analytics and Statistical Inference

  • Belief Propagation

  • Graph Algorithms

  • Matching Algorithms

  • Optimization

  • Approximation Algorithms

  • Simulations

  • Sensor Fusion

bottom of page