Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
; security analysis of composite systems, formal verification of networks, emergent security issues in networked cyber-physical systems and peripherals; cyber operations, adversarial examples, and anomaly
-
-2025” concerning security-threatening activities against Sweden. Graduates in the spring of 2026 may also apply Where to apply Website https://www.bth.se/english/vacancies/job/phd-student-position-in
-
collaboration with industry and public sector partners. The Institute of Applied Computer Systems conducts internationally recognised research and education in systems analysis, modelling and simulation, data
-
including compliance with federal control information (FCI) and controlled unclassified information (CUI) regulations and sponsor contracting requirements, insider and external threat awareness, analysis and
-
outside of your own department and within, through information and systems risk analysis exercises on assets within their own areas of expertise. Help others discern and measure areas of probable loss. Help
-
in one or more of the following programming languages/environments: Python, PyTorch (or similar), and experience with LLM frameworks (e.g., Hugging Face, LangChain) or data analysis tools. Hold a
-
the research activities of the team: SOTERN and of the laboratory IRISA and the department SRCD. The scientific activities of this department are related to Network Systems, Cyber Security and Digital Law. The
-
‑related controls. The position also upholds confidentiality, cyber‑security practices, and appropriate access controls, recognising that while much AMIS data is routine, some elements require secure
-
in Cyber Security at the undergraduate level. Our current research strengths are in Cyber Deception, DDoS mitigation, IIoT Security, Malware analysis, etc. More information about the group can be found
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and