Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
candidates with research interests in any of (but not necessarily limited to) the following areas: Security and AI (i.e., AI for security and/or secure AI) Cyber-risk management Malware analysis and
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
critical maritime operation or system Collecting and curating operational and security-related data for AI-based threat analysis Training AI and machine learning models for anomaly and threat detection
-
Detection and Analysis · Assist with conducting advanced intrusion detection and analysis utilizing information security monitoring systems. · Work in tandem with other IIT personnel to diagnose
-
; security analysis of composite systems, formal verification of networks, emergent security issues in networked cyber-physical systems and peripherals; cyber operations, adversarial examples, and anomaly
-
including compliance with federal control information (FCI) and controlled unclassified information (CUI) regulations and sponsor contracting requirements, insider and external threat awareness, analysis and
-
position in the context of the project M etamo rphic Secur ity T esting A ssisted by L LMs (MORTAL), funded by the Cyber Research Hub and in collaboration with NC3. The project objective is the definition
-
‑related controls. The position also upholds confidentiality, cyber‑security practices, and appropriate access controls, recognising that while much AMIS data is routine, some elements require secure
-
outside of your own department and within, through information and systems risk analysis exercises on assets within their own areas of expertise. Help others discern and measure areas of probable loss. Help
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and