Sort by
Refine Your Search
-
the impacts of various anonymization techniques from a business, legal and regulatory standpoint Designing and evaluating a reference process model to guide the implementation of legally compliant data
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
cybersecurity allowing thus to validate and receive feedback from on-the-field cybersecurity practitioners. As generative AI (GenAI) platforms and large language models (LLMs) are increasingly integrated
-
computational models and data analysis code to process large, multimodal behavioral datasets using both traditional methods (e.g., factor analysis) as well as more modern approaches (e.g., deep learning
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
social acceptability. D2ET will develop a comprehensive digital platform for planning energy transition scenarios, leveraging a consolidated data model and advanced analytics to facilitate strategic
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services