Sort by
Refine Your Search
-
Listed
-
Category
-
Country
- United States
- United Kingdom
- Norway
- Australia
- Germany
- Netherlands
- Denmark
- United Arab Emirates
- Sweden
- Canada
- Portugal
- Singapore
- Belgium
- Spain
- China
- France
- Austria
- Vietnam
- Finland
- Hong Kong
- Morocco
- Poland
- Saudi Arabia
- Croatia
- Ireland
- Italy
- Luxembourg
- Czech
- India
- Switzerland
- Cyprus
- Estonia
- Japan
- New Zealand
- Andorra
- Armenia
- Brazil
- Bulgaria
- Latvia
- Lithuania
- Romania
- 31 more »
- « less
-
Program
-
Field
- Economics
- Computer Science
- Medical Sciences
- Engineering
- Business
- Science
- Education
- Biology
- Arts and Literature
- Materials Science
- Mathematics
- Psychology
- Humanities
- Law
- Social Sciences
- Electrical Engineering
- Sports and Recreation
- Chemistry
- Design
- Earth Sciences
- Linguistics
- Environment
- Physics
- Philosophy
- 14 more »
- « less
-
of cybersecurity. Examples areas of interest include, but aren’t limited to: ● Problems at the intersection of cybersecurity and artificial intelligence/machine learning (AI/ML) ● Systems and
-
intelligence, statistical learning, data mining, machine learning, database fundamentals, and related data models and queries. The IAD is the home of several graduate programs, including a Ph.D. in Computational
-
or hear (including the use of a telephone and computer). Occasionally required to walk, stand, and make presentations This position may involve sitting at a desk for extended periods of time Specific vision
-
: Experience or familiarity in one or more of the following: Embedded or real-time software systems Robotics or autonomous systems Computer vision or image-based sensing Controls systems or automation Data
-
. Entering information from source documents into computer databases and spreadsheets, compiling, printing and distributing periodic reports, mailing labels, and other information as needed. Maintaining
-
: Bachelor's degree required Experience: At least 3-4 years of related experience in not-for-profit or higher education events fundraising. Skills: Must have above-average computer skills including database
-
interpersonal relationships, including strong listening, verbal, and written communication ? Skilled using computer applications and enterprise systems, including word processing, spreadsheet, and presentation
-
and experience screening, documentation(s)/ certification(s) screening Oral assessment (Oral assessments are conducted over Zoom. If you lack reliable computer or internet connectivity, accommodations
-
the supervision of the PI, including proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. Pursue research topics
-
priority will be given to those in the following areas. Artificial intelligence (with a focus on Machine Learning, Multi-agent Systems) Systems and networking Cyber security Established in collaboration with