Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- University of Luxembourg
- Cranfield University
- Delft University of Technology (TU Delft)
- Leiden University
- Tallinn University of Technology
- Technical University of Denmark
- Nature Careers
- Aalborg University
- Delft University of Technology (TU Delft); Delft
- IMDEA Networks Institute
- Leiden University; 's-Gravenhage
- AALTO UNIVERSITY
- AI & Cyber Futures Institute - Charles Sturt University
- Academic Europe
- Delft University of Technology (TU Delft); today published
- Lancaster University;
- Linköping University
- Linköpings universitet
- Luleå University of Technology
- NTNU - Norwegian University of Science and Technology
- NTNU Norwegian University of Science and Technology
- Radboud University
- Ruhr-Universität Bochum •
- Seed Robotics
- The University of Manchester;
- University of British Columbia
- University of Exeter
- University of Greenwich
- University of Potsdam •
- University of Warwick
- 20 more »
- « less
-
Field
-
and emerging applications, such as multi-domain autonomy and aerial mobility. With rising risks to PNT systems from interference, spoofing, and cyber-physical attacks, unified, security-aware integrity
-
is vital to the security of our society. We teach and conduct research in cyber security, information security, communications networks and networked services. Our areas of expertise include biometrics
-
, this PhD position is for you. At DTU Compute, you will develop novel methods in streaming process mining and artificial intelligence to tackle real-world cyber threats, working side by side with leading
-
Renewable Gas Systems, we develop innovative digital and analytical solutions to enable secure, flexible, and data-driven electricity grids. By combining digitalisation with advanced planning and operational
-
infrastructure. However, the increasing application requirements and rising threats from intentional interferences, spoofing, and cyber-physical attacks expose vulnerabilities in conventional GNSS-centric systems
-
opportunity to participate and propose other projects within the group and so also develop his/her/their own research agenda. We are working on various topics related to applied ML and cyber-security, including
-
range of topics in cryptography, privacy and cyber security. Tackling the societal challenges of security and privacy goes beyond just the technical field of computer science. Therefore, some of our
-
security vulnerabilities. You will innovate the Find2Fix pipeline by making the different steps, including found issues and suggested patches, easier to understand using interpretable AI using state machine
-
an important contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and
-
tool that allows developers to quickly find and fix software errors including security vulnerabilities. You will innovate the Find2Fix pipeline by making the different steps, including found issues and