Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
assessment within defence contexts, while also contributing to the academic literature on cyber security analytics. Where to apply Website https://www.academictransfer.com/en/jobs/359873/postdoctoral-position
-
. The postdoctoral researcher will conduct cutting-edge research in areas such as cyber-physical systems security, protection of critical infrastructure, and adversarial machine learning. The position will involve
-
areas (demonstrated through peer-reviewed articles or pre-prints): Applied Machine Learning (ML) for industrial settings like part-autonomous robots, and building simulation or test environments
-
Requirements Have relevant competence in the areas of Cyber Security. Degree in Infocomm, Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology or equivalent. Possessing a
-
, artificial intelligence, and related areas, including cyber-physical systems security and adversarial machine learning. Publish research findings in high-quality peer-reviewed journals and conferences
-
., Zheng, G., & Srikumar, V. (2017). DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning. Proceedings of the ACM Conference on Computer and Communications Security (CCS). [6] Kwon
-
on research focused on securing systems and addressing data privacy and security challenges in machine learning. About You To be successful for this position, you will have: Demonstrated ability to prepare and
-
-physical systems secure and resilient in the presence of uncertainty and cyber-physical attacks? Then you may be our next PhD candidate in resilient and learning-based control of cyber-physical systems
-
focused on securing systems and addressing data privacy and security challenges in machine learning. About You To be successful for this position, you will have: Demonstrated ability to prepare and deliver
-
motivated and enthusiastic Lecturer in Cyber Security. We welcome applicants who have experience in Ethical Hacking, System Penetration, Secure Software Development, Information Security and Cryptography