Apart from own research and funded projects, we are also actively collaborating with the researchers from reputed universities and research organizations worldwide. Our research and development activities span across various sub domains of cybersecurity and cyber-resilience that include but not limited to the following topics:


AI/ML for Cybersecurity

Applications of Artificial Intelligence, Machine learning, Large Language Models, AI-Agents for cybersecurity - Digital forensics, Large data analysis, developing customised small language models for cybersecurity.

Security for Autonomous Systems

Intrusion detection and prevention solutions (IDPS) for autonomous systems lile Autonomous vehicles, drones, robots, UAVs etc.

Security for Internet-of-Things (IoT)

Tailored solutions for the heterogeniuos network of multiple devies, including complex high end devices, personal devices, and tiny resource constrained sensors.

Applied Cryptography

Designing security solutions suitable for specific practical use cases, which involves adapting existing cryptographic algorithms and/or proposing novel alternate solutions.

Security for Cyber-physical Systems

CPS are integrated systems with physical processes and computational components interacting through a network, e.g., Smart grids, Smart manufacturing plants, Autonomous vehicles etc. Special solutions are needed to address practical requirements.

Wireless Physical Layer Security

Theses topics include designing novel security solutions that exploit the unique features of wireless signal/communication medium being used.

Cloud Security

Security protocols for protecting large amount of sensitive data stored in the cloud. Secure indetity and access control solutions to allow authorised access of data.

Hardware Security

The topics include designing security mechanisms that employ uncloneable hardware features, that are uniue to each device/item.

Security for Wireless Networks

Security mechanisms for various kinds of wireless networks such as 5G, 6G, short range networks, personal area network (PAN), wide area networks (WAN), Long Range WANs (LoRaWAN), Wifi, bluetooth, ZigBee, IEEE 802.15.4, NFC, RFID etc.

Video Processing based Security Solutions

Video analysis based cybersecurity solutions/user authentication for detecting fraud and impersonation attacks.

Speech Signal/Audio Processing based Security Solutions

Security solutions that exploit unque feaures of speech signal for user identification, authentication and fraud detection.

Image Processing based Security Solutions

Image analysis based security solutions to detect tamper evidences in images, scanned documents, identification of AI-generated vs real photos etc.

Blockchain based Security

blockchains are immutable distributed ledgers used for secure and transparent methods to record and verify a number of transactions. Many security solutions are essential for applications like cryptocurrencies, smart contracts, IoT applications etc.

Systems Security and Resilience

System security involves desig and implementation of threat detection and prevention frameworks suitable for specific system/subsystem as per the use case.

Advanced AI-based Solutions for Security Operations

AI and AI-agents enabled cybersecurity solutions for SOC can help to automate continous monitoring of network events, greatly improve the efficiency of operations, reduce the cost and manpower required.

Post Quantum Security

Developing quantun safe security solutions such as key generation, trust establishment, key management/distribution etc.

Embedded Systems Security

Customised security solutions for embedded systems need to consider resource constraints like computation capability, memory, size of data, key management/distribution etc.

Vulnerability and Threat Analysis

Vulnerability and threat analysis covers many topics like code analysis, resilience testing, penetration testing, analysis for malwares, software/hardware bugs that can lead to security incidents etc.

Biometric based Security

Biometric based security solutions are essential for user identification, authention applications for secure access permission to critical data/resources.