Sort by
Refine Your Search
-
Category
-
Country
-
Employer
-
Field
-
critical maritime operation or system Collecting and curating operational and security-related data for AI-based threat analysis Training AI and machine learning models for anomaly and threat detection
-
The Department of Electronic Systems at The Technical Faculty of IT and Design invites applications for a PhD stipend in the field of Real-time stream data analysis within the general study
-
selection criteria Knowledge of quantum communication / quantum information fundamentals (e.g., entanglement, fidelity/noise, quantum repeaters) Experience with network modelling, performance analysis
-
motivation for the position you have experience in artificial intelligence, data analytics, uncertainty analysis, probabilistic modelling, or statistical learning you have experience working on relevant
-
intelligence, data analytics, uncertainty analysis, probabilistic modelling, or statistical learning you have experience working on relevant research or project activities involving machine learning or data
-
specific research Centre, of which there are twelve totals. Information regarding the research Centres, their activities and production are available at http://www.fbk.eu/research-centers . In particular
-
duration of the PhD research. Please see the RePIM project website (https://repimnetwork.eu/recruitment ) for further information. Qualification requirements PhD stipends are allocated to individuals who
-
leading to a PhD degree in Cybersecurity Conduct high-quality research within the HAT-CI framework, primarily focusing on: Leading analysis and mapping of how human-AI teaming can enhance cyber defense
-
transmission of diagnostic data to cloud-based platforms for further analysis, visualization, and integration with digital maintenance workflows. Particular attention will be given to data security, integrity
-
. Subject description Cyber Security focuses on technical security aspects as well as protection of systems that are connected to the Internet and include protection of software, data, and hardware. Project