Sort by
Refine Your Search
-
Listed
-
Country
-
Employer
- Technical University of Denmark
- Delft University of Technology (TU Delft)
- Leiden University
- Tallinn University of Technology
- Cranfield University
- Nature Careers
- University of Luxembourg
- Aalborg University
- Delft University of Technology (TU Delft); Delft
- IMDEA Networks Institute
- Leiden University; 's-Gravenhage
- Monash University
- AI & Cyber Futures Institute - Charles Sturt University
- Aalborg Universitet
- Delft University of Technology (TU Delft); today published
- Lancaster University;
- Linköping University
- Linköpings universitet
- Lulea University of Technology
- Luleå University of Technology
- Luleå tekniska universitet
- NTNU - Norwegian University of Science and Technology
- NTNU Norwegian University of Science and Technology
- Radboud University
- The University of Manchester;
- University of Exeter
- University of Potsdam •
- 17 more »
- « less
-
Field
-
Social Science PhD Opportunity on Understanding vulnerabilities to Cyber Scams Research Job No.: 686697 Location: Clayton campus Employment Type: Full-time Duration: The scholarship may be held
-
in Cyber Security and is an expert in cybersecurity and cybercrimes, having led large interdisciplinary projects focused on cyber scams, insider threats, online deception, cybersecurity practices
-
Research themes: Cyber Security, AI, Decentralized Systems, Applied Cryptography UK students This 3.5-year PhD studentship is open to Home (UK) applicants. The successful candidate will receive an
-
employees and 17,670 students. Subject description Cyber Security focuses on technical security aspects as well as protection of systems that are connected to the Internet and include protection of software
-
application! We are looking for a PhD student in AI and machine learning with a focus on generative machine learning methods for cyber security applications. Your work assignments The primary focus of this PhD
-
. Subject description Cyber Security focuses on technical security aspects as well as protection of systems that are connected to the Internet and include protection of software, data, and hardware. Project