An application to explore automating threat hunting queries for cross-platform detection developments
Exploring the capability of implementing a framework to represent known threat actor groups from public sources with offense vulnerability assessment tools.
A Survey on Attacks and Defences on LoRaWAN Gateways.
An application for investigating if it is possible to detect anomalies using supervised machine learning algorithms.
An client-server application for investigating the speed of cryptographic handshakes using post-quantum algorithms.
Investigation of techniques for preserving data integrity in industrial networks.