Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
during the 2nd year of the PhD A vast choice of networking events and activities within the PhD@Tec21 Programme and through the international network of MSCA fellows Access to the UGA International Student
-
various disciplines: computer scientists, mathematicians, biologists, chemists, engineers, physicists and clinicians from more than 50 countries currently work at the LCSB. We excel because we are truly
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
The Section of Bioinformatics, DTU Health Tech is world leading within Immunoinformatics and Machine-Learning. Currently, we are seeking a highly talented and motivated PhD student within the field
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
you! Responsibilities and qualifications The PhD scholarships address four exciting topics. For all positions, you will collaborate closely with a group of PhD students, postdocs and international
-
bioprocess engineering. Supervise student projects (BSc, MSc, PhD). Attract competitive external funding nationally and internationally. Build and strengthen collaborations with academia, industry, and
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
in medical information systems, medical terminologies, data modeling, and standards in medical informatics Interest in data protection and IT security and their legal and technical implementation High