Sort by
Refine Your Search
-
personalized immunotherapies for cancer patients with brain metastasis. The TCI group works at the interface between immunology and cancer biology and combine the use of preclinical models of cancer and human
-
the interface between immunology and cancer biology and combine the use of preclinical models of cancer and human samples with state-of-the-art technologies to profile the immune microenvironment of brain
-
cybersecurity allowing thus to validate and receive feedback from on-the-field cybersecurity practitioners. As generative AI (GenAI) platforms and large language models (LLMs) are increasingly integrated
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
one-fits-all model was proven unsuccessful. Large Language Models (LLMs) and knowledge graph models are expected to harmonize the formats and semantics but there are many open questions about their
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security