Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
doctoral degree in cryptography or a related area. Good oral and written presentation skills in English. The ability to teach courses at the department (https://wiki.math.ntnu.no/emner ). PLEASE NOTE: For
-
State University of New York University at Albany | Albany, New York | United States | about 1 hour ago
exponentially more efficient calculations than conventional computers. This would revolutionize fields that involve optimization, modeling and simulation, cryptography, and AI. However, realizing this potential
-
, especially in relation to cryptography. The exact research topics can be adjusted within the limits set by our current projects according to the interests of the applicant. Your goal in research will be
-
and conduct research in cyber security, information security, communications networks and networked services. Our areas of expertise include biometrics, cyber defence, cryptography, digital forensics
-
Government of Canada | Government of Canada Ottawa and Gatineau offices, Ontario | Canada | about 1 month ago
. Technical competencies: • Cryptography and Cryptanalysis How to apply To apply, visit the CSE Careers page and select the “Strategic Researcher (Machine Learning)” Poster. Note: Be prepared to provide two (2
-
Science, Actuarial Sciences, or Cryptography. Additional Assignment has the following Preferred Education & Experience: Five years of teaching experience at the college/university level as the instructor
-
. · Artificial Intelligence, Machine Learning, and Data-Driven Systems – edge AI, embedded intelligence, and neuromorphic computing. · Cybersecurity & Privacy – hardware and IoT security, post-quantum cryptography
-
department. The successful candidates will teach a variety of undergraduate courses in Computer Security, including information security, computer forensics, cryptography, biometrics, physical security and