Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
security vulnerabilities. You will innovate the Find2Fix pipeline by making the different steps, including found issues and suggested patches, easier to understand using interpretable AI using state machine
-
: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity solutions”, we are looking for a PhD candidate
-
tool that allows developers to quickly find and fix software errors including security vulnerabilities. You will innovate the Find2Fix pipeline by making the different steps, including found issues and
-
-users and teams (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new cybersecurity solutions”, we are looking for a PhD candidate
-
PhD position in organisational cybersecurity: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new
-
Apply now PhD position in organisational cybersecurity: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles
-
answer is: “What do successful organisations do differently on the individual, team, and organisational level to prevent the occurrence of cyber incidents or reduce their impact?” This position focuses
-
answer is: “What do successful organisations do differently on the individual, team, and organisational level to prevent the occurrence of cyber incidents or reduce their impact?” This position focuses
-
opportunity to participate and propose other projects within the group and so also develop his/her/their own research agenda. We are working on various topics related to applied ML and cyber-security, including
-
of TPM provides an important contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its