Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
assist with the evolution and deployment of the Digital Research cyber security maturity uplift. What you’ll do: Assist with the identification, initial analysis, and documentation of cyber security events
-
experience with statistical modelling, regression analysis, or predictive analytics; Strong programming skills and practical experience with data-driven research; Affinity with or experience in cyber security
-
mitigation, IIoT Security, Malware analysis, etc. More information about the group can be found here . He aha ngā take me tono mai ai koe? - Why should you apply for this position? We want you to be part of
-
. of Matematica e Informatica duration: 12 months Where to apply Website http://www.unife.it/concorsi Requirements Additional Information Eligibility criteria Eligible destination country/ies for fellows: Italy
-
27.03.2026, Academic staff The research group Cyber-Physical Systems of Prof. Matthias Althoff at the Technical University of Munich offers a PhD/Postdoc position in the area of safe data-driven
-
physical worlds (Fig. 1). On the one hand, traditional IT security methods focus primarily on protecting information and do not directly consider the possible physical consequences of cyber-attacks
-
interaction, communication, or psychology. Masters or Ph.D. in Human-Computer Interaction (HCI), Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology will be advantageous
-
undergraduate students take one or more courses at the department each year. You can find more information about us on the Department of Information Technology website . The doctoral student will join the Secure
-
hybrid dynamical systems and control, optimization, and its application to cyber security. Familiarity with Lyapunov based analysis and control design tools is a must. This PhD position is part of a
-
critical maritime operation or system Collecting and curating operational and security-related data for AI-based threat analysis Training AI and machine learning models for anomaly and threat detection