Igor Santos
Cybersecurity Researcher
Expertise: Systems Security; Project Management

Security Research (VIII) – Papers, Language

We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,

Security Research (VII) – The reject

Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some

Research in USA and in Spain

It is not a secret that in the United States of America   (usually) more and better research than in the rest of the world is done. But why? What happens in Computer Science and System Security? And what is

Security Research (VI) – Papers, Structure

After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:

Security Research (V) – 4 errors, 1 failure

In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how  a scientific contribution is done in

Security Research (IV) – Contributions

In our previous posts of our series “Security Research” we saw how to make one of the first and most important step that both doctoral student and thesis director must carry out: the definition of the first general workplan. At this

Security Research (III) – General workplan

In previous posts of this series “Security research” have covered the selection of a theme and a director to be able to carry the doctoral thesis. This time we approach one of the most crucial aspects of the dissertation: the definition of the first workplan.

Security Research (II) – The advisor

We continue with the series of how to start making research in secruity. Once the doctoral student has chosen several possible topics, you must select a advisor. This aspect can be critical to the ultimate success. It is therefore imperative

Security Research (I) – Topic selection

In this series of posts we will introduce the reader into the world of academic research on systems security. The series will consist of several deliveries in which steps and tips to get started in academic research of impact are

Future directions of research on systems security

The computing scenario has changed a lot over the years, provoking an explosion of new technologies, interaction scenarios and. most importantly, a democratization of technology usage. In the fascinating research area of Systems Security the goal has been always to

PackerInspector

Our sandbox for packers

Categories