Search

Artificial Intelligence

Cybersecurity for the Internet of Things (IoT)

The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges. In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed. The course is split in four main modules, described as follows: Understand and illustrate the basic concepts of the IoT paradigm and its applications Discern benefits and drawback of the most common IoT communication protocols Identify the cybersecurity threats associated with IoT systems Know and select the appropriate cybersecurity countermeasures Course Plan Module 1: Introduction to IoT Definition and characteristics of IoT IoT architecture and components Applications of IoT Module 2: Communication Protocols for IoT Overview of communication protocols used in IoT MQTT, CoAP, and HTTP protocols Advantages and disadvantages of each protocol Module 3: Security Threats to IoT Overview of cybersecurity threats associated with IoT Understanding the risks associated with IoT Malware, DDoS, and phishing attacks Specific vulnerabilities in IoT devices and networks Module 4: Securing IoT Devices and Networks Overview of security measures for IoT systems Network segmentation, access control, and encryption Best practices for securing IoT devices and networks Organisation and Examination Study hours: 80 hours distributed over 7 weeks Scehduled online seminars:  January 30th 2024, February 12th 2024 and 11th of March Examination, one of the following: Analysis and presentation of relevant manuscripts in the literature Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements The number of participants in the course is limited, so please hurry with your application!

Deep Learning for Industrial Imaging

This course will teach you how to build convolutional neural networks. You will learn to design intelligent systems using deep learning for classification, annotation, and object recognition.

Predictive Data Analytics

The course will give insights in fundamental concepts of machine learning and actionable forecasting using predictive analytics. It will cover the key concepts to extract useful information and knowledge from big data sets for analytical modeling

Trustworthy Artificial Intelligence

AI systems are increasingly being integrated into various industrial processes, including manufacturing, logistics, and autonomous vehicles. Trustworthy AI ensures that these systems operate reliably, reducing the risk of accidents or costly errors.  Trustworthy AI helps companies comply with ethical standards and legal regulations. It ensures that AI systems do not discriminate against certain groups, violate privacy rights, or engage in other unethical behaviors. Trustworthy AI System course can support in the development of more advanced AI technologies, fostering research collaboration, and attracting talent.