Apart from own research and funded projects, we are also actively collaborating with the researchers from reputed universities and research organizations worldwide. Our research and development activities span across various sub domains of cybersecurity and cyber-resilience that include but not limited to the following topics:
Applications of Artificial Intelligence, Machine learning, Large Language Models, AI-Agents for cybersecurity - Digital forensics, Large data analysis, developing customised small language models for cybersecurity.
Intrusion detection and prevention solutions (IDPS) for autonomous systems lile Autonomous vehicles, drones, robots, UAVs etc.
Tailored solutions for the heterogeniuos network of multiple devies, including complex high end devices, personal devices, and tiny resource constrained sensors.
Designing security solutions suitable for specific practical use cases, which involves adapting existing cryptographic algorithms and/or proposing novel alternate solutions.
CPS are integrated systems with physical processes and computational components interacting through a network, e.g., Smart grids, Smart manufacturing plants, Autonomous vehicles etc. Special solutions are needed to address practical requirements.
Theses topics include designing novel security solutions that exploit the unique features of wireless signal/communication medium being used.
Security protocols for protecting large amount of sensitive data stored in the cloud. Secure indetity and access control solutions to allow authorised access of data.
The topics include designing security mechanisms that employ uncloneable hardware features, that are uniue to each device/item.
Security mechanisms for various kinds of wireless networks such as 5G, 6G, short range networks, personal area network (PAN), wide area networks (WAN), Long Range WANs (LoRaWAN), Wifi, bluetooth, ZigBee, IEEE 802.15.4, NFC, RFID etc.
Video analysis based cybersecurity solutions/user authentication for detecting fraud and impersonation attacks.
Security solutions that exploit unque feaures of speech signal for user identification, authentication and fraud detection.
Image analysis based security solutions to detect tamper evidences in images, scanned documents, identification of AI-generated vs real photos etc.
blockchains are immutable distributed ledgers used for secure and transparent methods to record and verify a number of transactions. Many security solutions are essential for applications like cryptocurrencies, smart contracts, IoT applications etc.
System security involves desig and implementation of threat detection and prevention frameworks suitable for specific system/subsystem as per the use case.
AI and AI-agents enabled cybersecurity solutions for SOC can help to automate continous monitoring of network events, greatly improve the efficiency of operations, reduce the cost and manpower required.
Developing quantun safe security solutions such as key generation, trust establishment, key management/distribution etc.
Customised security solutions for embedded systems need to consider resource constraints like computation capability, memory, size of data, key management/distribution etc.
Vulnerability and threat analysis covers many topics like code analysis, resilience testing, penetration testing, analysis for malwares, software/hardware bugs that can lead to security incidents etc.
Biometric based security solutions are essential for user identification, authention applications for secure access permission to critical data/resources.