InQbit members have background experience in:
- Capturing security requirements and analysing threats in order to determine security specifications,
- Data analytics to identify risks and assess their impact, while also analyzing how cost, risks, and mitigation measures interrelate and affect the quality of security levels
- Security analysis and vulnerability assessment as well as techniques to realize hybrid security approaches in terms of (prioritized) deployment patterns of varying security and privacy mechanisms to manage the identified risks
- Data analytics for cyberthreats and cyberattacks
- Security in embedded/mobile devices and networks
- Password-less authentication involving both biometric and behavioural techniques
- Attribute-based access control involving anonymous credentials and attribute-based encryption
- Trusted computing environments and code attestation techniques