Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
, computational intelligence and machine learning, autonomous systems, optimization and networks, embedded and real-time systems hardware and software, fault diagnosis, cyber-security, reliability, resiliency and
-
time off. To access this tool and learn more about the total value of your benefits, please click on the following link: https://resources.uta.edu/hr/services/records/compensation-tools.php CBC
-
teach cybersecurity, AI, and cyber-informed engineering courses at undergraduate and graduate levels; Establish and sustain an independent, externally funded research program; Produce high-quality
-
; cyber-physical systems; cybersecurity; digital forensics; machine learning and artificial intelligence; semiconductors and microelectronics; power and energy systems; signal processing; and space-based
-
current research focuses on industrial plant security, digital twins, synthetic data for machine learning in privacy research, formalisation of security risk management and security and privacy
-
programs. To learn more about UofSC benefits, access the "Working at USC" section on the Applicant Portal at https://uscjobs.sc.edu. Research Grant or Time-limited positions may be eligible for all, some, or
-
programming in Python. - Information security and assurance, cyber-analytics, and incident analysis and response. - Web development (especially Python-based full-stack web application design and development
-
interaction, communication, or psychology. Masters or Ph.D. in Human-Computer Interaction (HCI), Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology will be advantageous
-
safeguards to ensure the secure option of all systems on campus. Responsibilities KEY RESPONSIBILITIES*: 1. Collaborates with stakeholders to resolve computer security incidents and vulnerability compliance 2
-
faculty. Our current research focuses on industrial plant security, digital twins, synthetic data for machine learning in privacy research, formalisation of security risk management and security and privacy