Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
assist with the evolution and deployment of the Digital Research cyber security maturity uplift. What you’ll do: Assist with the identification, initial analysis, and documentation of cyber security events
-
experience with statistical modelling, regression analysis, or predictive analytics; Strong programming skills and practical experience with data-driven research; Affinity with or experience in cyber security
-
mitigation, IIoT Security, Malware analysis, etc. More information about the group can be found here . He aha ngā take me tono mai ai koe? - Why should you apply for this position? We want you to be part of
-
resilient control Designing controllers that maintain performance under faults and cyber-physical attacks. Probabilistic guarantees and uncertainty quantification Establishing guarantees on stability, safety
-
. of Matematica e Informatica duration: 12 months Where to apply Website http://www.unife.it/concorsi Requirements Additional Information Eligibility criteria Eligible destination country/ies for fellows: Italy
-
-physical systems secure and resilient in the presence of uncertainty and cyber-physical attacks? Then you may be our next PhD candidate in resilient and learning-based control of cyber-physical systems
-
enhancements, including advanced navigation algorithms, swarm intelligence, cyber security hardening, and payload-specific control systems. Key Responsibilities: Control Augmentation Development: Design
-
27.03.2026, Academic staff The research group Cyber-Physical Systems of Prof. Matthias Althoff at the Technical University of Munich offers a PhD/Postdoc position in the area of safe data-driven
-
Employer https://main.hercjobs.org/jobs/22192432/lead-information-security-analyst-security-operations Return to Search Results
-
physical worlds (Fig. 1). On the one hand, traditional IT security methods focus primarily on protecting information and do not directly consider the possible physical consequences of cyber-attacks