Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
systems. These Cyber-Physical Systems (CPS) combine physical processes with digital computation, and are therefore exposed to threats in both domains. While security measures such as encryption and
-
Resilience of Cyber-Physical Transport Systems Award Summary 100% fees covered and a minimum tax-free annual living allowance of £20,780 (2025/26 UKRI rate) (Only available for UK students
-
About the Project The future power grid will be a highly complex cyber-physical system, integrating multiple distributed energy resources (DERs) such as solar, wind, marine, and bioenergy alongside
-
, interdisciplinary collaboration, and professional development. Your research will not only shape the future of secure EV charging but also influence broader cyber-physical systems worldwide. Project aims and
-
-CSR) and an Academic Centre of Excellence in Cyber Security Education (ACE-CSE) until January 2029. The University of Kent is committed to equality, diversity, widening participation and inclusion and
-
to the interests of one of the School’s research groups: Cyber-physical Health and Assistive Robotics Technologies Computational Optimisation and Learning Lab Computer Vision Lab Cyber Security Functional
-
-Physical Systems research theme, focused on improving quality of life through cutting-edge technology. The research aims to design context-aware multimodal AI methods to understand and model human behaviours
-
proposals related to the themes of its two research centres. These themes include information systems and digital business, information management and modelling, business process management, digital business
-
infrastructure. However, the increasing application requirements and rising threats from intentional interferences, spoofing, and cyber-physical attacks expose vulnerabilities in conventional GNSS-centric systems
-
and emerging applications, such as multi-domain autonomy and aerial mobility. With rising risks to PNT systems from interference, spoofing, and cyber-physical attacks, unified, security-aware integrity