LECTURERS

Security challenges of Digital Twins

 Security of mobile apps: vulnerability assessment and penetration testing

CryptoVerif:  Mechanizing Game-Based Proofs of Security Protocols

Perspectives on future networks security

Critical Infrastructures Protection

Effective cybersecurity protection – with humans, for humans