68 computer-security-"https:"-"https:"-"Adolescent-Health-Study-(AHS)" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
13 Dec 2025 Job Information Organisation/Company University of Amsterdam (UvA) Research Field Computer science » Informatics Economics » Political economy Economics » Social economics Mathematics
-
recruitment of personnel. We do … Where to apply Website https://www.academictransfer.com/en/jobs/357251/phd-position-computational-desi… Requirements Additional Information Website for additional job details
-
Radboud University? Visit the page about working as a PhD candidate . Where to apply Website https://www.academictransfer.com/en/jobs/357055/phd-position-computational-mult… Requirements Specific
-
PhD Position in Categorical Foundations of Type Theory Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40 Application deadline: 6
-
PhD Position on Parameterized and Fine-Grained Complexity of NP-Hard Problems Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40
-
distinctly European strategy for securing public value in education amid rapid digitalization and deepening technological dependencies. This theoretical and empirical work will feed into the co-creation
-
structural, social and psychological integration within organizations. While identity-based policies can provide identity safety or foster in-group cohesion, they may also risk reinforcing organizational
-
the Department of Sociology, the interdisciplinary programme SOCION and the interuniversity research school ICS. This PhD project is part of the SOCION consortium. SOCION addresses a pressing challenge of our
-
scholars who have made valuable and innovative contributions to science or scientific practice. These contributions may relate to the themes identified in the Recognition & Rewards programme : research
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate