- Securing industrial IoT networks (sensors, actuators, PLCs)
- Post-quantum VPN, PKI and critical infrastructure
- Digital twins for security validation
- Satellite–edge–cloud secure control loops
- Timing attacks, RF attacks, EM leakage analysis
Models:
- Control-theory models for secure feedback
- Stochastic fault modelling
- Side-channel leakage quantification
- Resilience metrics for CPS (cyber-physical systems)
Scientific Value: physical security of energy, transportation, industry, and finance.