Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
Detection and Analysis · Assist with conducting advanced intrusion detection and analysis utilizing information security monitoring systems. · Work in tandem with other IIT personnel to diagnose
-
critical maritime operation or system Collecting and curating operational and security-related data for AI-based threat analysis Training AI and machine learning models for anomaly and threat detection
-
outside of your own department and within, through information and systems risk analysis exercises on assets within their own areas of expertise. Help others discern and measure areas of probable loss. Help
-
; security analysis of composite systems, formal verification of networks, emergent security issues in networked cyber-physical systems and peripherals; cyber operations, adversarial examples, and anomaly
-
position in the context of the project M etamo rphic Secur ity T esting A ssisted by L LMs (MORTAL), funded by the Cyber Research Hub and in collaboration with NC3. The project objective is the definition
-
availability of university systems and data; Provide leadership in the enforcement of security and associated policies; Provide leadership to the team in the analysis, discussion, and development of security
-
articulation as functional and logical designs. Contribute to the development of architectural methods, processes, standards that align with overall business, technology and cyber security strategies. Design
-
related to one or more of the following areas: technology and crime, cyber security studies, fraud studies, artificial intelligence analysis, criminology, and criminal justice.
-
in Cyber Security at the undergraduate level. Our current research strengths are in Cyber Deception, DDoS mitigation, IIoT Security, Malware analysis, etc. More information about the group can be found