Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
related to one or more of the following areas: technology and crime, cyber security studies, fraud studies, artificial intelligence analysis, criminology, and criminal justice.
-
proposals led by the Systems Program and Faculty. Current Application Areas of Interest: Cyber-Human-Physical Systems: Human-System Interaction, Human-Centered Planning and Design. Smart, Connected, & Healthy
-
University of North Carolina at Chapel Hill | Chapel Hill, North Carolina | United States | about 10 hours ago
Carolina, within a reasonable commuting distance of their assigned duty station. The Information Security Office coordinates the institution’s response to cyber risk, operates critical organization-wide
-
The Department of Electronic Systems at The Technical Faculty of IT and Design invites applications for a PhD stipend in the field of Real-time stream data analysis within the general study
-
30 Mar 2026 Job Information Organisation/Company Cranfield University Department HR & Development Group Research Field Engineering » Aerospace engineering Researcher Profile Recognised Researcher
-
maintenance of various security and data protection technologies that support the teaching, research, and business functions of the university. The Engineer collaborates with members of both IAM and other teams
-
in Cyber Security at the undergraduate level. Our current research strengths are in Cyber Deception, DDoS mitigation, IIoT Security, Malware analysis, etc. More information about the group can be found
-
outside of your own department and within, through information and systems risk analysis exercises on assets within their own areas of expertise. Help others discern and measure areas of probable loss. Help
-
analysis based on the types of risk, probability of risk, and potential severity of exposure to the University. Collaborates with UC Legal, Privacy, and Information Security in providing guidance on emerging
-
including compliance with federal control information (FCI) and controlled unclassified information (CUI) regulations and sponsor contracting requirements, insider and external threat awareness, analysis and