171 associate-professor-computer-"https:"-"https:"-"https:"-"https:"-"UCL"-"UCL" positions in Belgium
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
similar). Co-promoters can also be guest professor or postdoctoral researcher. Third Parties (companies, foreign partners, ...) can be part of the consortium, but can never receive funding from FWO
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
(including pig) and tissue fluent user of computer software (e.g., Microsoft 365, SPSS/Prism, EndNote,…) flexibility to learn new skills and develop novel approaches for analysis ability to work independently
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
professor at Ghent University that will accept them as a candidate. You can look for a professor in your research domain through our research directory . How does it work? Your application can be in English
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and