Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
enhancements, including advanced navigation algorithms, swarm intelligence, cyber security hardening, and payload-specific control systems. Key Responsibilities: Control Augmentation Development: Design
-
data, IoT and cyber-security, and also of quantum technologies in order to contribute to the realization of Society 5.0, which is a super-smart society envisaged by Japanese government. Faculty
-
27.03.2026, Academic staff The research group Cyber-Physical Systems of Prof. Matthias Althoff at the Technical University of Munich offers a PhD/Postdoc position in the area of safe data-driven
-
related to staff position within a Research Infrastructure? No Offer Description Job Information Project: Young Researcher Network for Security and Resilience of Critical Cyber-Physical Systems (SecReSy4You
-
modules in core computer science and contribute specifically to those related to Cybersecurity, including topics such as information governance, mitigation strategies, network security, attacks and
-
data, IoT and cyber-security, and also of quantum technologies in order to contribute to the realization of Society 5.0, which is a super-smart society envisaged by Japanese government. Faculty
-
Requirements Have relevant competence in the areas of Cyber Security. Degree in Infocomm, Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology or equivalent. Possessing a
-
data, IoT and cyber-security, and also of quantum technologies in order to contribute to the realization of Society 5.0, which is a super-smart society envisaged by Japanese government. Faculty
-
25 Mar 2026 Job Information Organisation/Company UNIVERSIDAD DE MÁLAGA Department NETWORK, INFORMATION AND COMPUTER SECURITY LAB (NICS Lab) Research Field Computer science » Informatics Computer
-
physical worlds (Fig. 1). On the one hand, traditional IT security methods focus primarily on protecting information and do not directly consider the possible physical consequences of cyber-attacks