Sort by
Refine Your Search
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
Posting Details Position Details Title Associate/Full Professor in Digital Health Appointment Status Tenure Department IU Indianapolis Department of Health Policy & Management – Fairbanks School
-
well as M.S. degrees in Digital Forensics and Telecommunications. The department comprises more than 30 faculty members and serves over 950 students, including more than 300 graduate students. ECE maintains a
-
analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software Engineering: SDLC, requirement analysis, design
-
Qualifications: Applicants must have received a PhD in Cyber Security, Engineering, Computer Science or a related field by the start date of the position; Should have demonstrated potential for excellence and
-
North Carolina A&T State University | Greensboro, North Carolina | United States | about 1 month ago
of specialization, Digital Forensics, Investigative Science, Social Justice, and Research Methods. The Department has over 550 majors. The College of Arts, Humanities, and Social Sciences houses the Departments
-
for Lecturer and Senior Lecturer positions. This role focuses primarily on teaching and student development, contributing to SIT’s applied learning approach. We welcome passionate educators, preferably having
-
, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software
-
Engineering (ECE) Department offers B.S. and M.S. degrees in both Electrical Engineering and Computer Engineering, a Ph.D. in Electrical and Computer Engineering, as well as M.S. degrees in Digital Forensics
-
background, the teaching may be centred around cybersecurity (e.g., penetration testing, usable security, ICS/OT security, incident response, digital forensics, etc.), information security (e.g., risk