Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
-2025” concerning security-threatening activities against Sweden. Graduates in the spring of 2026 may also apply Where to apply Website https://www.bth.se/english/vacancies/job/phd-student-position-in
-
in AI and cybersecurity to develop novel solutions to cyber-resilient AI for the benefit of Swedish industry and society. The vision is to make Sweden a role model in secure trustworthy AI by
-
articulation as functional and logical designs. Contribute to the development of architectural methods, processes, standards that align with overall business, technology and cyber security strategies. Design
-
availability of university systems and data; Provide leadership in the enforcement of security and associated policies; Provide leadership to the team in the analysis, discussion, and development of security
-
collaboration with industry and public sector partners. The Institute of Applied Computer Systems conducts internationally recognised research and education in systems analysis, modelling and simulation, data
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
the research activities of the team: SOTERN and of the laboratory IRISA and the department SRCD. The scientific activities of this department are related to Network Systems, Cyber Security and Digital Law. The
-
and conduct research in cyber security, information security, communications networks and networked services. Our areas of expertise include biometrics, cyber defence, cryptography, digital forensics
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and
-
platforms, security analysis, adversarial AI attacks and defences, intrusion detection, load management in mobile edge networks, or denial-of-service detection are considered as a merit. Earlier experience in