Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
information, you may refer to https://www.uni.lu/snt-en/research-groups/svv The position holder will be required to perform the following tasks: Carrying out research in the predefined areas Implementing
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
The Department of Electronic Systems at The Technical Faculty of IT and Design invites applications for a PhD stipend in the field of Real-time stream data analysis within the general study
-
candidates with research interests in any of (but not necessarily limited to) the following areas: Security and AI (i.e., AI for security and/or secure AI) Cyber-risk management Malware analysis and
-
given preference. Job Duties and Responsibilities: Assist with social media analysis for the research projects, hypothesis generation and evaluation for understanding cyber behaviors, data collection
-
theories, social network analysis tools, and examining cyber campaigns conducted on social media will be given preference. A candidate with experience in computer programming and data management will be
-
; security analysis of composite systems, formal verification of networks, emergent security issues in networked cyber-physical systems and peripherals; cyber operations, adversarial examples, and anomaly
-
collaboration with industry and public sector partners. The Institute of Applied Computer Systems conducts internationally recognised research and education in systems analysis, modelling and simulation, data
-
outside of your own department and within, through information and systems risk analysis exercises on assets within their own areas of expertise. Help others discern and measure areas of probable loss. Help
-
definition of data–model independence • Information-theoretic bounds (mutual information, stability) • Analysis of privacy–utility trade-offs 2. Attack Modeling and Empirical Analysis • Implementation and