Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Leadership Team report directly to the Chief Information Officer (CIO) with the following portfolios: Strategy and Change; Operations; Information Systems, and Cyber Security. CIS work with departments across
-
cyber-physical systems, System-on-Chip (SoC), multi-die architectures, accelerator-based computing, brain-inspired/quantum computing, emerging device technologies, low-power/reliable design, and secure
-
Brandenburg University of Technology Cottbus-Senftenberg • | Cottbus, Brandenburg | Germany | about 14 hours ago
Energy Reform and Decarbonisation Biotechnology, Environment and Health Cognitive and Dependable Cyber-Physical Systems Objectives of the Graduate Research School: Promotion of outstanding young
-
tenured and tenure-track faculty are engaged in world-class research in Computer Vision, AI and Machine Learning, Virtual Reality, Bioinformatics, Software Engineering, Cyber Security and Privacy, Computer
-
work with Dr. Wanchun Liu , Senior Lecturer and Australian Research Council Discovery Early Career Researcher Award (DECRA) Fellow, whose work spans advanced AI, cyber-physical systems, and the science
-
, Security, and Space. To complete a virtual tour of the Prescott campus and check out Prescott Campus Future Flythrough, please visit the links below: https://prescott.erau.edu/admissions/tour-details https
-
campus in Arnold, Md., the college has degree centers at Arundel Mills, Glen Burnie and at centers and schools around the county. In 2012, the college opened the 30,000-square-foot Center for Cyber and
-
internationally recognized scholar to join our department as Professor or Associate Professor in Cyber Security with a focus on Cyber Physical Security. The position offers an exciting opportunity to contribute
-
the Center for Advanced Manufacturing Innovation and Cyber Systems (CAMICS), the Center for Nanotechnology, the Center for Aerospace Research, Industrial Assessment Center, the NSF Center for Multidisciplinary
-
Credentialing, Part 5, Subpart B.3)Preferred QualificationMaster's degree in Cyber Security, Computer Science, or Information Technology.Industry Recognized credentials: CompTIA Security+, CISSP, CEH CCNA