.- Privacy protection.
.- Advanced strategies for privacy preserving data publishing to improve multi class classification.
.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers.
.- SAAFL: Secure Aggregation for Label Aware Federated Learning.
.- "We've met some problems": Developers' Issues With Privacy Preserving Computation Techniques on Stack Overflow.
.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.
.- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform.
.- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration.
.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.
.- Industrial and Critical Infrastructure Security.
.- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic.
.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems.
.- Certified Secure Updates for IoT Devices.
.- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing.
.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems.
.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.
.- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation.
.- SAVA Deployment for Spoofed Source Attacks.
.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.