Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Delft University of Technology (TU Delft)
- Delft University of Technology (TU Delft); Delft
- Delft University of Technology (TU Delft); yesterday published
- University of Amsterdam (UvA)
- Delft University of Technology (TU Delft); today published
- University of Groningen
- Leiden University
- Radboud University
- University of Amsterdam (UvA); Amsterdam
- Eindhoven University of Technology (TU/e)
- University of Amsterdam (UvA); yesterday published
- University of Twente (UT)
- Eindhoven University of Technology (TU/e); yesterday published
- Leiden University; 's-Gravenhage
- University of Amsterdam (UvA); today published
- University of Groningen; Groningen
- Delft University of Technology
- Delft University of Technology (TU Delft); 10 Oct ’25 published
- Delft University of Technology (TU Delft); 3 Oct ’25 published
- Eindhoven University of Technology (TU/e); 4 Oct ’25 published
- Erasmus University Rotterdam
- Leiden University; today published
- Leiden University; yesterday published
- Maastricht University (UM)
- Maastricht University (UM); 26 Sep ’25 published
- Radboud University; yesterday published
- The Open Universiteit (OU)
- The Open Universiteit (OU); today published
- Tilburg University
- Universiteit van Amsterdam
- University Medical Center Utrecht (UMC Utrecht)
- University Medical Center Utrecht (UMC Utrecht); today published
- University of Amsterdam (UvA); 10 Oct ’25 published
- University of Twente
- University of Twente (UT); 26 Sep ’25 published
- Wageningen University and Research Center
- 26 more »
- « less
-
Field
-
to protect AI models against data leakage during inter-departmental information sharing. With the National Police heavily relying on sensitive data exchanges, this research will develop secure machine learning
-
reshape safety certification frameworks for safety critical systems leveraging AI and IoT technologies? This project aims at advancing inspection and data collection strategies optimization, and their
-
inspection and data collection strategies optimization, and their integration within novel data-driven risk assessment methodologies and safety certification frameworks. We focus on vertical transport (lifts
-
Are you passionate about hardware security, side-channel analysis and machine learning? Do you want to contribute to research within an international environment? If the answer is yes, please
-
7 Oct 2025 Job Information Organisation/Company The Open Universiteit (OU) Research Field Computer science » Cybernetics Computer science » Programming Researcher Profile First Stage Researcher (R1
-
This PhD position is part of RHYTHM (“Radiation, Health, Safety and Quality for Youth: A Comprehensive Approach to Justification, Optimisation, and Education”) , a European Union-funded research
-
control framework that enables clinician-guided navigation, with validation in anatomical phantoms and ex vivo tissue. The ultimate aim is to improve diagnostic accuracy in gastrointestinal screening while
-
Security vulnerabilities in software products can be detected by static analysis, where the source code is analysed without executing the software, and by dynamic analysis, where the software is executed and
-
. For example, how can we restore Rust’s safety guarantees when integrating it with legacy C code? More generally, how can we ensure that software components —written in different languages and by different
-
of the risk assessment is carried out on the legal basis of the GDPR: performing a public task in the public interest. You can find more information about this assessment on our website about knowledge security