Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
assessment within defence contexts, while also contributing to the academic literature on cyber security analytics. Where to apply Website https://www.academictransfer.com/en/jobs/359873/postdoctoral-position
-
on research focused on securing systems and addressing data privacy and security challenges in machine learning. About You To be successful for this position, you will have: Demonstrated ability to prepare and
-
focused on securing systems and addressing data privacy and security challenges in machine learning. About You To be successful for this position, you will have: Demonstrated ability to prepare and deliver
-
fully funded PhD position in the area of safe data-driven system identification for cyber-physical systems, offered by our research group at the intersection of control theory, machine learning, and
-
-FNR PEARL Research Grant in the area of Information Systems Engineering, and, depending on interest, in fields, such as Generative AI & Machine Learning, Data Privacy, Cyber Security, Digital Identities
-
: The successful candidate will closely work with faculty supervisor on hardware security projects. The ideal candidate will have an excellent knowledge of cyber security. Applicants must have a BSc with any level
-
programming. Knowledge and experience in artificial intelligence and machine learning is expected, but not required. Knowledge and experience in deep learning, generative AI and cyber security is considered
-
Requirements Have relevant competence in the areas of Cyber Security. Degree in Infocomm, Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology or equivalent. Possessing a
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
Learning and Control Laboratory , an interdisciplinary research group doing basic and applied research at the intersection of cybersecurity, control theory, and machine learning. Our vision is to develop