67 computer-security-"https:"-"https:"-"Linköping-University" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
recruitment of personnel. We do … Where to apply Website https://www.academictransfer.com/en/jobs/357251/phd-position-computational-desi… Requirements Additional Information Website for additional job details
-
PhD Position in Categorical Foundations of Type Theory Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40 Application deadline: 6
-
, and respectful research environment in the Department of Sociology, the interdisciplinary programme SOCION and the interuniversity research school ICS. This PhD project is part of the SOCION consortium
-
ensure the long-term resilience of coastal and urban infrastructure. Your development A personalized training programme will be established, tailored to your training needs and career objectives
-
distinctly European strategy for securing public value in education amid rapid digitalization and deepening technological dependencies. This theoretical and empirical work will feed into the co-creation
-
- and transdisciplinary research community and training programme; professional command of both English and Dutch; demonstrated skills in quantitative and qualitative research methods, or—where experience
-
structural, social and psychological integration within organizations. While identity-based policies can provide identity safety or foster in-group cohesion, they may also risk reinforcing organizational
-
the Department of Sociology, the interdisciplinary programme SOCION and the interuniversity research school ICS. This PhD project is part of the SOCION consortium. SOCION addresses a pressing challenge of our
-
scholars who have made valuable and innovative contributions to science or scientific practice. These contributions may relate to the themes identified in the Recognition & Rewards programme : research
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate