Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
data center, compute, storage, networking, and core services Ensure high availability, performance, security, and compliance of infrastructure platforms Manage capacity planning, lifecycle management
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
administration) Duration BOF doctoral scholarship with label In accordance with the regulations for PhD scholarship recipients, the doctoral program starts by definition with a scholarship agreement of 1 year. If
-
report on your progress regularly. You will participate in the doctoral study programme at the Antwerp Doctoral School to support your PhD pathway. You will present the findings of your PhD research
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
working on nonlinear and multiphoton optical spectroscopy and microscopy for molecular and materials characterization. The project is part of the broader MIP research programme across KU Leuven (Leuven and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and