Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
) creates knowledge for a better world and solutions that can change everyday life. Department of Information Security and Communication Technology Research is vital to the security of our society. We teach
-
, and satellite technologies; and • Digital engineering, digital twin systems, artificial intelligence and machine learning, quantum computing, and advanced computational methods. Experience with
-
research, optimization, and decision analytics. • Supply chain engineering and logistics systems. • Human factors and ergonomics. • Data analytics, artificial intelligence and machine learning
-
a state-of-the-art learning environment with specialized spaces for computer science, including a cyber range, forensics/cyber lab, and hardware/networking lab. The Department of Management
-
starting in Fall 2026. While we welcome applicants with expertise in broader computer/network security, privacy, and cyber forensics, we are particularly interested in security and privacy in AI/ML, applying
-
Technologies (quantum communication, computing, sensing, nanoelectronics, emerging devices, energy-efficient systems) Cybersecurity and Cyber Physical Systems (hardware, software, and network security; AI
-
network security, hardware and embedded system security, cryptography, privacy-preserving and trustworthy computing, AI-driven security and adversarial machine learning, security of cyber-physical and
-
Research Excellence in Cyber-Physical Infrastructure Systems (MECIS), and the University Transportation Center for Railway Safety (UTCRS). For further information regarding the College, please visit our
-
. The organization consists of five groups: Enterprise Infrastructure Services; Enterprise Applications; Learning Support Services; IT Security; and Enterprise Service Delivery. About the Position: The Director, IT
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and