· Cloud security
· Distributed system security
· Intrusion detection and prevention
· Secure information flow
· Network anomaly detection
· Privacy computing
· Email security
· Network isolation
· Signal detection
· Information communication security
· Information disclosure
· Information theft