567 information-security "https:" "https:" "https:" "https:" "https:" "Dr" uni jobs at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Field
-
The Opportunity The Faculty of Arts is looking for an organised and proactive School Administrative Officer to support the smooth and effective operation of the School and its Centres. In this pivotal role, you
-
Goal Recognition is the task of inferring the goal of an agent from their action logs. Goal Recognition assumes these logs are collected by an independent process that is not controlled by
-
, collaborative community Be surrounded by extraordinary ideas - and the people who discover them The Opportunity Monash University is seeking a Manager - Server & Virtualisation Operations to drive the strategic
-
provide high-quality operational and administrative support, oversee service contracts, ensure compliance with quality and safety standards, and contribute to continuous improvement initiatives. This is an
-
Privacy-Enhancing Technologies (PETs) are a set of cryptographic tools that allow information processing in a privacy-respecting manner. As an example, imagine we have a user, say Alice, who wants
-
Candidates should hold a previous degree (Bachelor’s and/or Master’s) in Computer Science, Data Science, Robotics, Mechatronics, or Software Engineering, with demonstrated knowledge in machine
-
Antimicrobial resistance (AMR) is one of the most significant and immediate threats to health in Australia and globally. We are working on harnessing new technologies such as artificial intelligence
-
This project examines how films produced in Asian markets perform in terms of commercial success and critical recognition using real-world industry data. Students will compile a dataset of films
-
This Ph.D. project aims to combine causal analysis with deep learning for mental health support. As deep learning is vulnerable to spurious correlations, novel causal discovery and inference methods
-
Anomaly detection is an important task in data mining. Traditionally most of the anomaly detection algorithms have been designed for ‘static’ datasets, in which all the observations are available