Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
-2025” concerning security-threatening activities against Sweden. Graduates in the spring of 2026 may also apply Where to apply Website https://www.bth.se/english/vacancies/job/phd-student-position-in
-
and society. The vision is to make Sweden a role model in secure trustworthy AI by pioneering cyber resilience across the AI lifecycle. The research program focuses on four key themes: Trustworthy and
-
instruction related to Computer Support Specialists/Cybersecurity. This is an apprenticeship program for computer support specialists/cyber security occupations at Coastline. To achieve competency, students
-
qualified faculty member in Cyber Security/Information Assurance (CSIA) meets the program standard through one of the following three routes: · Possesses an earned master’s degree or higher, from a regionally
-
or more of the following areas: AI and machine learning, natural language processing, large language models (LLM), experience in designing prompts, fine-tuning LLMs, or distributed systems. Good knowledge
-
articulation as functional and logical designs. Contribute to the development of architectural methods, processes, standards that align with overall business, technology and cyber security strategies. Design
-
through applied research programmes. Faculty in the ICT Cluster undertake funded industry-relevant research, teach courses in Computer Science, Computer Engineering, Information Security and Software
-
to SAFE. Delivering EVU course from SAFE center. Required selection criteria A PhD degree (or equivalent) in biometrics, information security, computer science, electrical engineering, or machine learning
-
funding is made available to information technology (IT) practitioners, both in the public and private sector, who are responsible for securing computer networks or responding to any type of cyber-based
-
Center (ARC) in Bloomington. ARC brings together government, military, industry, and academic partners to address complex national security challenges. Within its secure facilities, researchers work