Developing Complete Security Solutions for a Trusted Digital Economy.

By 2025, society will become hyper connected and will rely on innovative cybersecurity approaches to protect organizations and individuals. The new security solutions will be based on self-adaptive detection algorithms, highly distributed big data processing, especially from connected objects, merging of contextual information, and cognitive science. Multiple aspects such as simplified use, processing automation, responsibility, respect of privacy, ethics or costs, will prove to be differentiating factors.

R & D activities carried out with partners to design secure digital systems

Digital protection:

  • Accelerate the integration of a holistic approach for systems cyber security.
  • Improve trust around data and digital identity, driven by current regulations and their future evolution.
  • Increase the supply chain’s resilience for an industrial sector by providing major contractors and suppliers with tools that can quantify cyber risk and allow residual risks to be covered by insurance companies.


  • Develop intrusion detection capabilities.
  • Promote multi-source approaches to provide more relevant decisions with the help of artificial intelligence technologies.
  • Optimize the location and number of deployed detection probes to secure a system’s architecture.


  • Use steering information in monitoring systems to generate alerts or detections of “abnormal” behavior and trigger remediation actions.
  • Integrate the latest techniques for graphical data visualisation of data infrastructures within the new generation of supervision centers.

Example of use cases

  • Massive processing and visualization of multi-source data for Security Operations Centers (SOC).
  • Optimized deployment of anomaly detection probes in heterogeneous information systems.
  • Cyber resilience of the industrial supply chain.
  • Authentication mechanism to ensure digital identity and associated access rights of third-party maintenance operators.
  • Securing software life cycle for maintaining industrial infrastructures in a safe condition.
  • Light cryptography for IoT ensuring the integrity of data exchange.


  • Cybersecurity
  • Artificial Intelligence
  • Cryptography
  • IoT
MPO Project’s end

MPO Project’s end

Programme Inscription Venez découvrir les résultats de nos travaux de recherche autour de l'optimisation de la maintenance des ... Read more

Miguel Anjos will run a Seminar@SystemX

Miguel Anjos will run a Seminar@SystemX

Resume Biography Inscription Miguel Anjos (Professor and Chair of Operational Research in the School of Mathematics, University of ... Read more


Subscribe to IRT SystemX's

and receive every month the latest news from the institute: