Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
processes based on mobile digital technologies increase, so do the amount and severity of cyber threats. Both defenders and attackers are now using Machine Learning (ML) and Artificial Intelligence (AI
-
security methodologies, cyber threats and vulnerabilities, authentication, authorization, and access control methods. Knowledge of operational impacts of cybersecurity lapses. Experience with cyber defense
-
. The overall goal is to contribute to improved security, resilience, and situational awareness in critical infrastructure systems. For more information and how to apply: https://www.jobbnorge.no/en/available
-
proposals led by the Systems Program and Faculty. Current Application Areas of Interest: Cyber-Human-Physical Systems: Human-System Interaction, Human-Centered Planning and Design. Smart, Connected, & Healthy
-
Credentialing, Part 5, Subpart B.3)Preferred QualificationMaster's degree in Cyber Security, Computer Science, or Information Technology.Industry Recognized credentials: CompTIA Security+, CISSP, CEH CCNA
-
for extreme conditions, soft matter biomechanics, computational and data-enabled engineering, cyber-physical systems and security, and nuclear and other sustainable energies. Our undergraduate and master’s
-
areas such as systems and software security, data privacy, human-centered security and privacy, and trustworthy AI. This includes, but is not limited to, research on trusted computing and system
-
next-generation networks. In particular, the postdoctoral fellow will take a lead role in investigating novel methods to address the cyber security of future flexible and programmable communication
-
, Georgia 30308, United States of America [map ] Subject Areas: Cyber Security Security and Privacy Information Security and Privacy / Information Security and Privacy Appl Deadline: 2026/01/01 04:59 AM
-
and releases, for Windows, Mac and Linux Follow me printing infrastructure management Racking servers, patching fibre optic and CAt5/6A cables Contribution to the response to cyber security incidents