Skip to content
  • About
    • Mission
    • Contact
  • Community Engagement
  • Research
  • Leadership
    • UCI Leadership
    • Executive Committee
    • Affiliated Faculty
  • News & Events
    • News
    • Events
  • Cyber Resources
  • Participate
    • Get Involved
    • Financial Support
  • About
    • Mission
    • Contact
  • Community Engagement
  • Research
  • Leadership
    • UCI Leadership
    • Executive Committee
    • Affiliated Faculty
  • News & Events
    • News
    • Events
  • Cyber Resources
  • Participate
    • Get Involved
    • Financial Support

Research Temp

Research

Cyber-Physical and IoT Security

Cyber Physical Systems (CPS) -- lying at the intersection of engineering and computer science, cyber-physical systems are engineered systems built from, and dependent upon, the seamless integration of computational and physical components.
Learn More

Mobile Device and App Security

From smartphones and tablets to wearable computers and handheld gaming consoles, mobile devices are pervasive in our personal lives, workplaces and classrooms.
Learn More

Network and Cloud Security

The goal of network security is to identify threats and prevent them from entering and spreading through the network. Effective network security requires a spectrum of measures, including hardware, software, policy and process.
Learn More

Cybersecurity Law and Policy

Technical measures are necessary, but not sufficient, to create and maintain effective cybersecurity. Development, education, understanding, and enforcement of appropriate cybersecurity laws and policies are a vital part of a solid cybersecurity ecosystem.
Learn More

Privacy and Data Security

Cybersecurity and privacy go hand in glove.
Learn More

Software Security

Flaws in a single line of code can result in data loss, unexpected or malicious software behavior, covert monitoring or even system failure. Examples of common software security attacks include buffer overflow, command injection and SQL injection attacks.
Learn More
Facebook.       Twitter icon          PDF icon

©2024 University of California, Irvine   Cybersecurity Policy & Research Institute
All Rights Reserved • Privacy Policy

This website uses cookies to ensure you get the best experience on our website. Read our policy.

Accept & Close
Decline

This website uses cookies to ensure you get the best experience on our website. Read our policy.

Accept & Close
Decline