44 information-security-"https:"-"https:"-"https:"-"https:"-"U.S" PhD positions at Technical University of Denmark in Denmark
Sort by
Refine Your Search
-
to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates
-
. The main task is to explore and implement novel efficient anonymous credential schemes which remain secure against quantum attackers. You should have: Master’s degree (or equivalent) in computer science or a
-
research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU National Food
-
is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. At DTU Chemical Engineering it is our mission
-
ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU Civil and
-
are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
assessment. Design and train reinforcement learning agents to optimize operational safety. Build and validate dynamic Bayesian network models integrating empirical and synthetic data. Conduct scenario-based