Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
risk analysis. -Testing for security and security countermeasures analysis and implementation -Access and usage control for secure data sharing in industrial eco-systems. -Virtualization at the cloud
-
with real-world applications, in collaboration with Volvo Cars and Volvo Group. This is an ideal position for candidates interested in interpretable AI, safety guarantees, and high-impact research in
-
the mobility, ubiquity, security, and interactivity of computers, data, software, and users. The pervasive computing paradigm enables technologies such as sensors, actuators, and computers to take a back seat
-
the mobility, ubiquity, security, and interactivity of computers, data, software, and users. The pervasive computing paradigm enables technologies such as sensors, actuators, and computers to take a back seat
-
the Division of Vehicle Engineering and Autonomous Systems (VEAS) , with some collaboration from the Division of Vehicle Safety. VEAS is a research division with close ties to the local vehicle industry
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
values rest on credibility, trust and security. By having the courage to think freely and innovate, our actions together, large and small, contribute to a better world. We look forward to receiving your
-
the intersection of control theory, robotics, artificial intelligence, and signal processing, and is a key enabler of future intelligent infrastructure.This project will focus on the development of novel control
-
postgraduate education in areas such as Information Processing Technologies, including Quantum Information and Computation, Optoeletronics, Physical Layer Security and Information Theory, Cybersecurity and