12 lecture-cyber-security PhD positions at Delft University of Technology (TU Delft) in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
security vulnerabilities. You will innovate the Find2Fix pipeline by making the different steps, including found issues and suggested patches, easier to understand using interpretable AI using state machine
-
contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and research
-
health, agriculture, climate and safety. To achieve our ambitious goals, we bring together scientists, engineers and industry in an inspiring environment, with plenty of space for ambition
-
changer in many social and economic sectors – including health, agriculture, climate and safety. To achieve our ambitious goals, we bring together scientists, engineers and industry in an inspiring
-
knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8 of the National Knowledge Security Guidelines . We carry out this check on
-
-employment screening can be part of the selection procedure. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult
-
—combining the compliance and safety of soft systems with the precision and performance required for impactful applications. The PhD candidate will be encouraged to actively shape the direction of the research
-
. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8 of the National Knowledge Security Guidelines . We
-
be part of the selection procedure. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8
-
be part of the selection procedure. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8