Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
analysis based on the types of risk, probability of risk, and potential severity of exposure to the University. Collaborates with UC Legal, Privacy, and Information Security in providing guidance on emerging
-
collaboration with industry and public sector partners. The Institute of Applied Computer Systems conducts internationally recognised research and education in systems analysis, modelling and simulation, data
-
Responsibilities: Assist with social media analysis for the research projects, hypothesis generation and evaluation for understanding cyber behaviors, data collection, cleaning, preprocessing, analyzing findings
-
teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies
-
definition of data–model independence • Information-theoretic bounds (mutual information, stability) • Analysis of privacy–utility trade-offs 2. Attack Modeling and Empirical Analysis • Implementation and
-
methods to provide explainable outputs from AI models in presence of attacks on the models or data, and scalable methods that move beyond feature attribution aiming for root cause analysis and decision
-
’ professional experience in IT including at least three years’ in a Solution Architecture role. Experience with designing and building AWS or Azure AI solutions. Working with technical teams, cyber, data and
-
maintenance of various security and data protection technologies that support the teaching, research, and business functions of the university. The Engineer collaborates with members of both IAM and other teams
-
trends and composition analysis, refractive index determination, and morphology for applications such as environmental monitoring, nuclear non-proliferation, and improving predictive modeling tools (e.g
-
of IT planning and implementation. This position plays a key role in safeguarding the university’s information systems against evolving cyber threats and ensuring the confidentiality, integrity, and