Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software
-
project deliverables are met. Derivation of closed-form theoretical latency and timeliness expressions for cloud-hosted AI services and edge-assisted offloading strategies. Analysis of theoretical latency
-
cybersecurity, digital forensics, vulnerability assessment, malware analysis, privacy technologies, and AI security AI and Emerging Fields: Smart healthcare, IIoT, computational fintech, robot-human interaction
-
. Awards will be finalised by July 2026. Supported Areas for START - Business, Communication and Design Financial and Sustainability Accounting: The measurement, reporting, and analysis of an organisation's
-
digital supply chain solutioning projects with both hardware and software elements. Experience in digital supply chain related projects with strong integration of the three pillars, i.e., Digitalization
-
Device Fabrication process, reliability analysis, process characterization, Semiconductor packaging, assembly and testing. System Engineering: System and Project Management, Model Based System Engineering
-
: The measurement, reporting, and analysis of an organisation's financial performance alongside its environmental, social, and governance (ESG) and carbon footprint. Integrating traditional financial accounting
-
for cloud-hosted AI services and edge-assisted offloading strategies. Analysis of theoretical latency and timeliness for cloud-hosted AI services and edge-assisted offloading strategies. Design and
-
Financial and Sustainability Accounting: The measurement, reporting, and analysis of an organisation's financial performance alongside its environmental, social, and governance (ESG) and carbon footprint
-
security, cyber-physical systems, IoT security, security analytics, operational cybersecurity, digital forensics, vulnerability assessment, malware analysis, privacy technologies, and AI security AI and