Security Research (VIII) – Papers, Language

We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,

Security Research (VII) – The reject

Well yes, we have already done a job that we believe has the level (and probably it has) and we receive an email with the fateful phrase “We regret to inform you” … Accompanied by the comments of the reviewers. In some

Security Research (VI) – Papers, Structure

After talking about how to choose a topic and  director, how to do the first work plan and how a scientific contribution it is done, in addition to listing four typical mistakes in this post we will discuss one of the most important aspects:

Security Research (V) – 4 errors, 1 failure

In this series of posts on how to start researching in system security, we have seen the first steps on how to choose topic, director, as well ad doing the first workplan and how  a scientific contribution is done in

Security Research (IV) – Contributions

In our previous posts of our series “Security Research” we saw how to make one of the first and most important step that both doctoral student and thesis director must carry out: the definition of the first general workplan. At this

Security Research (III) – General workplan

In previous posts of this series “Security research” have covered the selection of a theme and a director to be able to carry the doctoral thesis. This time we approach one of the most crucial aspects of the dissertation: the definition of the first workplan.

Security Research (II) – The advisor

We continue with the series of how to start making research in secruity. Once the doctoral student has chosen several possible topics, you must select a advisor. This aspect can be critical to the ultimate success. It is therefore imperative

Security Research (I) – Topic selection

In this series of posts we will introduce the reader into the world of academic research on systems security. The series will consist of several deliveries in which steps and tips to get started in academic research of impact are

Aitor Santamaría Ibirika, DeustoTech Computing researcher, new Ph. D.

“The researcher of DeustoTech Computing Aitor Santamaría Ibirika has defended his doctoral thesis on 24th October in the Salon de Grados at the University of Deusto. He obtained the International Mention and Excelent cum laude qualification.” Aitor Santamaría Ibirika, researcher

Jorge de la Peña Sordo, DeustoTech Computing research assistant, new Ph. D.

“Jorge de la Peña Sordo, DeustoTech Computing research assistant, has defended his doctoral thesis on 24th October in the Salon de Grados at the University of Deusto, obtaining the highest qualification with Cum Laude Mention and an International Mention.” Jorge

Categories