Sort by
Refine Your Search
-
security. This project investigates how blockchain analytics and data engineering can enhance the detection of illicit activities across these decentralised and increasingly complex networks. By deploying
-
(supervisor) The position holder will be required to perform the following tasks/will do research on the following topics: Software engineering practices for machine learning Tabular machine learning Large
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
corresponding to the requirements defined by the EU Directive 2010/63/EU and the Réglement Grand-Ducal of the 11th January 2013 (FELASA or equivalent) will be a plus. • Experience on bioinformatic analyses
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
immunofluorescence techniques. • Experience handling experimental mouse models and certified training on animal experimentation and welfare corresponding to the requirements defined by the EU Directive 2010/63/EU
-
, and API misuse scenarios are underexplored areas, lacking robust frameworks to systematically address them. The research project of the PhD student will thus focus on defining a rigorous testing
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security