Special Report on IUST’s Strengths in Cyber Security
Iran University of Science and Technology’s accredited professors within various fields, including Computer Engineering and Electric Engineering, have had major accomplishments in the country’s cyber security, aimed at protecting the country’s cyber borders and technology centers. Many IUST PhD dissertations have narrowed their research to the study of Iran’s cyber borders in light of the world’s cyber geography, and are centered on discovering and defining cyber borders. As the Islamic Republic has come under numerous attacks by the cyber terrorists, the national cyber security innovation has become the country’s established defense, relying heavily on the latest IT and ICT discoveries. Information technology specialists, along with IUST professors and researchers continue to create practical defense mechanisms for the country’s cyber territories and identities. Their focus includes a study on the attack on culture, military and industrial bases, economic networks, and personal spaces in society. Students work alongside their professors to expand their research on cyber security. Their study covers all computer based systems, including software and hardware, monitoring and management, security centers, computer networks, secure communications, artificial intelligence, secure cloud computing, secure data centers, and new technologies. IUST’s research projects have had obvious success in technological areas. The research and PhD dissertations at IUST are proper for the nation’s cyber security. It is up to our best abilities to guarantee the country’s cyber protection. There are a variety of laboratories at IUST’s computer engineering and electric engineering schools, which have narrowed their focus to cyber security technologies, and have occupied themselves with the execution of different projects. Research on computer systems, hardware and software, and artificial intelligence are on the rise. This increase has taken place in an domain of cloud computing, which embraces a new vision in the cyber world. Nonetheless, the creation and advancement of computer networks and communication technologies based on terrestrial fiber networks and wireless networks, such as mobile phones, continue to be under way. Finally, Artificial Intelligence continues to be at the head of the system, as it has completed our technological vision regarding cyber defense. |