125 information-security-"https:"-"https:"-"https:"-"Leeds-Beckett-University" PhD positions in Denmark
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background
-
Job Description About the MSCA project MICROSUNSET is a Marie Sklodowska-Curie Actions Doctoral Network (MSCA-DN) funded by the European Union in which we have 12 open positions for Doctoral
-
are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates
-
Jesper Hallas and Anton Pottegård. It comprises approx. 45 individuals and focuses on registry-based research covering all aspects of drug use, drug effects, and drug safety. The group is highly regarded
-
assessment. Design and train reinforcement learning agents to optimize operational safety. Build and validate dynamic Bayesian network models integrating empirical and synthetic data. Conduct scenario-based
-
research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. DTU National Food
-
background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted
-
The Department of Electronic Systems at The Technical Faculty of IT and Design invites applications for one or more PhD stipends in the field of Protocols and methods for quantum error correction
-
or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources