Sort by
Refine Your Search
-
Employer
-
Field
-
). Build on previous developed models. Your research will provide insights to and receive insights from a network of researchers working on the overall steel-related system change. This PhD position is part
-
seeking a PhD candidate to work on the NWO Vidi-funded Web Security and Privacy Observatory (WeSPO) project under the supervision of Dr Gunes Acar, tackling critical threats in online privacy and security
-
to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and research
-
and presented at international AI, software engineering, and security venues. The position is focused on discovering new errors using behavioral models learned from software. You will extend fuzzing
-
an important contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and
-
useful for research, education, and industrial use. Your research will be published and presented at international AI, software engineering, and security venues. The position is focused on discovering new
-
the EU Research Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description PhD position in organisational cybersecurity
-
through the EU Research Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description PhD in organisational cybersecurity: End
-
PhD position in organisational cybersecurity: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles to develop new
-
Apply now PhD position in organisational cybersecurity: Organisational differences (1.0 fte) For our NWO-funded project “From ‘what went wrong’ to ‘what works well?’ Using Safety 2 principles