Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
theories, working with social network analysis tools, and examining cyber campaigns conducted on social media; A candidate with experience in operational research, optimization tools, information theory
-
the modelling, simulation and analysis of the large, complex and dynamic systems (e.g. cyber and physical systems). The PhD student will join the Sheffield Control and Power Systems (CAPS) Laboratory (https
-
tuning mechanisms, with usage of MCP and agents for semi-automated execution of complex tasks, to support cybersecurity experts. Data analysis related to vulnerabilities and cyber attacks. Where to apply
-
proposals led by the Systems Program and Faculty. Current Application Areas of Interest: Cyber-Human-Physical Systems: Human-System Interaction, Human-Centered Planning and Design. Smart, Connected, & Healthy
-
critical maritime operation or system Collecting and curating operational and security-related data for AI-based threat analysis Training AI and machine learning models for anomaly and threat detection
-
candidates with research interests in any of (but not necessarily limited to) the following areas: Security and AI (i.e., AI for security and/or secure AI) Cyber-risk management Malware analysis and
-
of this charter. For more information about the School of Criminology and Criminal Justice, Watts College of Public Service and Community Solutions, and Arizona State University, please visit the following: http
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
information, you may refer to https://www.uni.lu/snt-en/research-groups/svv The position holder will be required to perform the following tasks: Carrying out research in the predefined areas Implementing
-
theories, social network analysis tools, and examining cyber campaigns conducted on social media will be given preference. A candidate with experience in computer programming and data management will be