Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
interdisciplinary research centers, including the Center for Cyber Security, the Center for Interacting Urban Networks (CITIES), Center for Artificial Intelligence and Robotics (CAIR), Center for Genomics and Systems
-
Temporary contract | 24 months | Belval - Luxembourg Are you passionate about research? So are we! Come and join us The Luxembourg Institute of Science and Technology (LIST) is a Research and
-
Computer Society–accredited programs in areas such as computer science, cyber security, software engineering, artificial intelligence, and data analytics. Guided by curricula from the IEEE Computer Society
-
. The Computing discipline offers industry‑aligned, Australian Computer Society–accredited programs in areas such as computer science, cyber security, software engineering, artificial intelligence, and data
-
a priority for the Computer Science Department, the University of Idaho, and the State of Idaho. In 1999 the University of Idaho was one of the first seven institutions in the country to be designated
-
to equity and excellence, and to contribute to a community that values your expertise and vision, we encourage you to apply. About Us The School of Information and Physical Sciences is a vibrant hub
-
Institute of Mathematical Sciences and Tandon School of Engineering. About NYU Abu Dhabi https://nyuad.nyu.edu/en/ NYU Abu Dhabi is the first comprehensive liberal arts and research campus in the Middle East
-
York’s Courant Institute of Mathematical Sciences and Tandon School of Engineering. About NYU Abu Dhabi https://nyuad.nyu.edu/en/ NYU Abu Dhabi is the first comprehensive liberal arts and research campus
-
NCSA Job Summary Apply cross-disciplinary IT Security knowledge to design, develop, implement, support, evaluate, and administer secure cyber-infrastructure for the networks and computer systems of
-
-integrated cyber systems that include intrusion detection, red-blue teaming (including modeling and accounting for human cognitive agents), as well as the development and evaluation of threat intelligence