Sort by
Refine Your Search
-
Deadline 20 Aug 2026 - 09:48 (UTC) Type of Contract Temporary Job Status Full-time Is the job funded through the EU Research Framework Programme? Not funded by a EU programme Is the Job related to staff
-
SD-25157 RESEARCHER IN ATMOSPHERIC PLASMA TREATMENT OF METALLIC SURFACES FOR INDUSTRIAL APPLICATIONS
occupying more than 5,000 square metres, including innovations in all that we do An environment encouraging curiosity, innovation and entrepreneurship in all areas Personalized learning programme to foster
-
An environment encouraging curiosity, innovation and entrepreneurship in all areas Personalized learning programme to foster our staff’s soft and technical skills Multicultural and international work environment
-
5,000 square metres, including innovations in all that we do An environment encouraging curiosity, innovation and entrepreneurship in all areas Personalized learning programme to foster our staff’s soft
-
distributed control strategies, including grid-forming converters connected to storage and renewable systems. Integrating IoT devices, edge controllers and middleware layers with cloud computing platforms
-
entrepreneurship in all areas Personalized learning programme to foster our staff’s soft and technical skills Multicultural and international work environment with more than 50 nationalities represented in our
-
, to support our activities within the NEUROH-CHANGE project (Resilience of Neurological Health in Global Change: A One Health Approach). NEUROH-CHANGE is an interdisciplinary research program aimed at enhancing
-
. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography
-
skills in data analysis, machine learning, as well as in mathematical and computational modelling? You will have the opportunity to investigate innovative solutions using machine learning algorithms and
-
Qualification: PhD in Computer Science Experience in dependable systems, real-time and embedded systems and/or operating systems and the threats and attacks they are exposed to is highly valuable