Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- Delft University of Technology (TU Delft)
- Aalborg University
- Delft University of Technology (TU Delft); Published yesterday
- IMDEA Networks Institute
- University of Luxembourg
- ;
- Aalborg Universitet
- Abertay University
- Academic Europe
- Delft University of Technology (TU Delft); Delft
- Delft University of Technology (TU Delft); Published today
- Delft University of Technology (TU Delft); today published
- Lulea University of Technology
- Manchester Metropolitan University;
- NTNU Norwegian University of Science and Technology
- Nature Careers
- Tallinn University of Technology
- Technical University of Denmark
- The University of Auckland
- University of Nottingham
- 10 more »
- « less
-
Field
-
. Specific requirements of the candidate The successful applicant is expected to have: An honours degree at first or upper second-class level in Cyber Security, Artificial Intelligence, Computer Science
-
to the interests of one of the School’s research groups: Cyber-physical Health and Assistive Robotics Technologies Computational Optimisation and Learning Lab Computer Vision Lab Cyber Security Functional
-
. Subject description Cyber Security focuses on technical security aspects as well as protection of systems that are connected to the Internet and include protection of software, data, and hardware. Project
-
-physical systems, data intensive systems, AI, planning, networks, programming theory, and security. Applications span areas such as energy, transport, health and water. The department plays an active role in
-
digital signal and image processing, IoT, cyber security, deep learning, and software systems. Applications in healthcare, multimedia, and sustainable urban environments are encouraged. School
-
application of scientific knowledge. Experience with quantitative research methods and data analysis is required. Experience with using LLMs is a plus. Excellent written and spoken command of English (C2
-
on Europe, with a detailed analysis of three selected case-study regions. Methodologically, SPHINX embraces five pillars, ranging from data collection to agent-based and computable general equilibrium
-
analysis tools, and to a big data analysis platform with substantial computing resources for their processing. Where to apply Website https://networks.imdea.org/job/phd-position-in-iot-security-and-privacy
-
, data analysis, and network measurement. In fact, the Ph.D. candidate contributions will advance our ability to detect and understand how users are tracked across devices, apps, and ecosystems, providing
-
with leading Danish and European companies, as well as international academic partners. The AI4OR group addresses complex, high-impact problems requiring advanced modelling, data analysis, and