84 information-security-"https:"-"https:"-"https:"-"https:"-"BBMRI-ERIC" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Utrecht University
- University of Twente
- Radboud University
- Erasmus University Rotterdam
- KNAW
- DIFFER
- Delft University of Technology (TU Delft)
- Eindhoven University of Technology
- Eindhoven University of Technology (TU/e)
- Tilburg University
- University of Amsterdam (UvA)
- Vrije Universiteit Amsterdam (VU)
- 2 more »
- « less
-
Field
-
protection strategies with inclusive governance models, this research project seeks to reconcile heritage security with social justice and participatory tourism development. This PhD position (DC-8) is
-
supervisor. Please send them to doctoraloffice@ese.eur.nl after submitting your application form. Because the work is in the defense and security domain, a Certificate of No Objection (VGB) from the AIVD and
-
stepfamilies, the redistribution of economic resources is less self-evident. This PhD project examines resource pooling and financial transfers to children in postdivorce families, focusing on the role
-
PhD Position in Music Computing Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40 Application deadline: 31 March 2026 Apply now
-
under changing environmental conditions is essential for sustainable subsurface utilisation. What you will do In this four-year study, you will develop an innovative, integrated approach that combines
-
Medical, Biomedical and Health Sciences Natural Sciences and Technology Who is it for? Scientists and scholars in the Kingdom of the Netherlands who obtained their PhD between three and seven years ago, and
-
communities. Your job Public debates on migration are frequently framed as confrontations between ‘pro’ and ‘anti’ positions. Such framings can undermine social cohesion by reinforcing the idea that society is
-
description: The current overlapping crises - political polarization, the climate, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
policy relevance. Your research will contribute to academic debates and inform public decision-making on flood risk management and climate adaptation. Your duties and responsibilities include: Developing