27 security-"https:"-"https:"-"https:"-"IFM"-"IFM"-"IFM" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
secure environment for PhD candidates at Maastricht University? Help us investigate which topics are important for our candidates to work on and improve social safety at the workplace. Research Assistant
-
Website https://www.academictransfer.com/en/jobs/359128/phd-position-in-secure-multi-pa… Requirements Additional Information Website for additional job details https://www.academictransfer.com/359128/ Work
-
theory? Do you want to develop cutting-edge control algorithms for the security and resilience of cyber-physical systems? We welcome you to apply for a PhD position in the SecReSy4You Doctoral Network, a
-
PhD position ‘Courage to Correct: Balancing Error Prevention and Learning in Strategic Crisis Teams’
matters most. Research shows that effective teams require psychological safety: the opportunity to voice concerns and seek feedback openly (Edmondson & Bransby, 2023). Studies on error management climates
-
University's Equality, Diversity and Inclusion policy. The core values of the faculty for Humanities are professionalism, transparency, responsibility, connectedness and safety. These values apply to everyone
-
shaping at the University of Twente, many applications have arisen, ranging from quantum security to microscopy. The key challenge of wavefront shaping is to find out exactly how to shape the light to form
-
orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures
-
. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive knowledge and technology. If you are
-
. The core values of the Faculty of Humanities are professionalism, transparency, responsibility, connectedness and safety. These values apply to everyone and we uphold these values in our work and in our
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate