Sort by
Refine Your Search
-
Listed
-
Country
-
Employer
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- George Mason University
- Jönköping University
- ;
- ADELAIDE UNIVERSITY
- Indiana University
- NTNU Norwegian University of Science and Technology
- Nanyang Technological University
- North Carolina A&T State University
- Pennsylvania State University
- Saint Leo University
- UNIVERSITY OF EAST LONDON
- UNIVERSITY OF THE WEST OF SCOTLAND
- University of Oregon
- University of Sheffield
- University of Texas at Dallas
- 6 more »
- « less
-
Field
-
areas as: digital forensics, computer vision, biometrics (face or voice recognition, etc.) and natural language processing. At Adelaide University, we create the opportunities you need to achieve your
-
analysis capabilities from non-invasive to invasive techniques in vulnerability assessment, forensics and certification of hardware devices and components. CHA comprises three main research groups
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
of digital education. They will also be able to evidence positive practice in these areas. The successful candidate will also be expected to lead the curriculum areas and to manage staff contributing
-
appointed to this position will also assist the Director of Speech in coaching the Comet Speech and Forensics team at UT Dallas. Preferred candidates will have experience in one or more of the following areas
-
Posting Details Position Details Title Associate/Full Professor in Digital Health Appointment Status Tenure Department IU Indianapolis Department of Health Policy & Management – Fairbanks School
-
well as M.S. degrees in Digital Forensics and Telecommunications. The department comprises more than 30 faculty members and serves over 950 students, including more than 300 graduate students. ECE maintains a
-
; OR • Nine (9) years of relevant experience in Cybersecurity. Expertise in two or more of the following IT Security domains is considered as relevant experience: Data Security, Digital Forensics, Incident
-
analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software Engineering: SDLC, requirement analysis, design
-
Qualifications: Applicants must have received a PhD in Cyber Security, Engineering, Computer Science or a related field by the start date of the position; Should have demonstrated potential for excellence and