Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- Aalborg University
- Nature Careers
- Delft University of Technology (TU Delft)
- Durham University
- Linköping University
- Technical University of Munich
- Aalborg Universitet
- European Space Agency
- Fondazione Bruno Kessler
- Iowa State University
- Oak Ridge National Laboratory
- Technical University of Denmark
- Tilburg University
- University of Luxembourg
- University of Texas at Arlington
- 5 more »
- « less
-
Field
-
(SOC) and cyber defence teams Education: Contribute in the teaching activities of the University's Cybersecurity Master program and supervise the scientific research of PhD/Master students Dissemination
-
, networks, control systems, AI, sound, cyber security, and robotics. The department plays an active role in transferring inventions and results into applications in close collaboration with industrial
-
applied research within communication, networks, control systems, AI, sound, cyber security, and robotics. The department plays an active role in transferring inventions and results into applications in
-
technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and research at the intersection of technology
-
are applicable to some visas. Person Specification Essential Criteria: Qualifications A good first degree in area of specialism (e.g., cyber security, computer science, or electrical engineering) A PhD (or be
-
world-leading fundamental and applied research within communication, networks, control systems, AI, sound, cyber security, and robotics. The department plays an active role in transferring inventions and
-
address cybercrime, whether cyber-enabled or -dependent, and may cover topics such as: • Victimization • Offenders • Hybridization of crime • Illicit online markets • Fraud • Cybersecurity
-
the Distributed AI for dependable cyberSecuritY (DAISY) Unit, of FBK-CS, which focuses on developing novel AI-driven methods for cyber threat detection in distributed computing environments, with a particular
-
the security or integrity of the infrastructure as set forth in Texas Executive Order GA-48. By assuming this position, and if you have access to critical infrastructure, you authorize the University to conduct
-
that aims at giving the European Union the technological edge and independence in next generation Edge AI technology, giving citizens and corporations access to reliable, safe, secure and independent