Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
of detecting and preventing cyber attacks and archiving the data for future use. Where to apply Website https://www.unibz.it/it/home/position-calls/positions-for-academic-staff/8160-s… Requirements Additional
-
for Cyber Security and Innovation The RMIT University Centre for Cyber Security Research and Innovation (CCSRI) was established in 2020 within the College of Business and Law. The focus of CCSRI is to develop
-
Momentum One Zero (M1.0) is Northern Ireland's new regional innovation centre for advanced digital technologies, creating commercial value for companies at the convergence of cyber security, AI, and
-
). Also, our full-time employees who have been employed with us successfully for more than 6 months can be considered for the Tuition Assistance Program. Consider applying with us today! The Cyber Range
-
the modelling, simulation and analysis of the large, complex and dynamic systems (e.g. cyber and physical systems). The PhD student will join the Sheffield Control and Power Systems (CAPS) Laboratory (https
-
the curriculum online for more information: https://lancaster-online-education.ac.uk/masters/msc-cyber-security/ We are particularly looking for candidates who are passionate about cyber security
-
As part of the expansion of Bristol Cyber Security Group, we wish to hire an outstanding candidate to fill an open-ended faculty position at Lecturer level in Software Security or Systems Security
-
. The University of North Georgia (UNG) is currently accepting applications for Mentors for the Cyber Warrior Academy (CWA) camp funded by the DOD SMC Cyber Institute. The vision of the UNG CWA is to work with high
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
tuning mechanisms, with usage of MCP and agents for semi-automated execution of complex tasks, to support cybersecurity experts. Data analysis related to vulnerabilities and cyber attacks. Where to apply