Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
Detection and Analysis · Assist with conducting advanced intrusion detection and analysis utilizing information security monitoring systems. · Work in tandem with other IIT personnel to diagnose
-
critical maritime operation or system Collecting and curating operational and security-related data for AI-based threat analysis Training AI and machine learning models for anomaly and threat detection
-
; security analysis of composite systems, formal verification of networks, emergent security issues in networked cyber-physical systems and peripherals; cyber operations, adversarial examples, and anomaly
-
outside of your own department and within, through information and systems risk analysis exercises on assets within their own areas of expertise. Help others discern and measure areas of probable loss. Help
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
position in the context of the project M etamo rphic Secur ity T esting A ssisted by L LMs (MORTAL), funded by the Cyber Research Hub and in collaboration with NC3. The project objective is the definition
-
availability of university systems and data; Provide leadership in the enforcement of security and associated policies; Provide leadership to the team in the analysis, discussion, and development of security
-
articulation as functional and logical designs. Contribute to the development of architectural methods, processes, standards that align with overall business, technology and cyber security strategies. Design
-
in Cyber Security at the undergraduate level. Our current research strengths are in Cyber Deception, DDoS mitigation, IIoT Security, Malware analysis, etc. More information about the group can be found