Opportunities
intrusion tolerance fault tolerance trusted execution environments Data Privacy intrusion detection software verification
Reader, the Department of Computer Science, City, University of London.
B4 L5 R5209
dependability fault tolerance cybersecurity
High Performance Computing power-aware computing fault tolerance distributed systems Computer architecture Cryptography