211 security-"https:" "https:" "https:" "https:" "UCL" "UCL" "UCL" "UCL" "UCL" "UCL" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Utrecht University
- Delft University of Technology (TU Delft)
- Eindhoven University of Technology (TU/e)
- University of Amsterdam (UvA)
- Wageningen University & Research
- Maastricht University (UM)
- University of Twente (UT)
- Vrije Universiteit Amsterdam (VU)
- University of Twente
- Radboud University
- Leiden University
- Erasmus University Rotterdam
- Erasmus University Rotterdam (EUR)
- Wetsus - European centre of excellence for sustainable water technology
- Amsterdam UMC
- Erasmus MC (University Medical Center Rotterdam)
- NIOZ Royal Netherlands Institute for Sea Research
- Tilburg University
- University Medical Center Utrecht (UMC Utrecht)
- Radboud University Medical Center (Radboudumc)
- University Medical Centre Groningen (UMCG)
- AMOLF
- DIFFER
- Delft University of Technology
- Eindhoven University of Technology
- KNAW
- NLR
- RiboPro B.V.
- University of Groningen
- 19 more »
- « less
-
Field
- Computer Science
- Biology
- Engineering
- Medical Sciences
- Economics
- Science
- Mathematics
- Chemistry
- Arts and Literature
- Humanities
- Social Sciences
- Materials Science
- Linguistics
- Physics
- Sports and Recreation
- Business
- Education
- Environment
- Psychology
- Earth Sciences
- Electrical Engineering
- Philosophy
- 12 more »
- « less
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are
-
strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among
-
. The core values of the Faculty of Humanities are professionalism, transparency, responsibility, connectedness and safety. These values apply to everyone and we uphold these values in our work and in our
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
scenario, given limited resources? The security situation in the world has changed rapidly since February 2022. Increasing threats also mean a reorientation for Defence: a renewed focus on warfighting, after
-
or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do
-
to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things
-
description: The current overlapping crises - political polarization, the climate, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but
-
, religious or ethnic background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening
-
, religious or ethnic background, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening