723 information-security "https:" "https:" "https:" "https:" "https:" "Brunel University London" positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
- European Space Agency
- Utrecht University
- University of Twente
- Delft University of Technology (TU Delft)
- University of Amsterdam (UvA)
- Eindhoven University of Technology (TU/e)
- Erasmus University Rotterdam
- Wageningen University & Research
- KNAW
- Leiden University
- Vrije Universiteit Amsterdam (VU)
- Maastricht University (UM)
- University of Twente (UT)
- Radboud University
- Amsterdam UMC
- Tilburg University
- University Medical Center Utrecht (UMC Utrecht)
- Erasmus MC (University Medical Center Rotterdam)
- Erasmus University Rotterdam (EUR)
- Radboud University Medical Center (Radboudumc)
- NIOZ Royal Netherlands Institute for Sea Research
- Nature Careers
- University Medical Centre Groningen (UMCG)
- Wetsus - European centre of excellence for sustainable water technology
- Eindhoven University of Technology
- Royal Netherlands Academy of Arts and Sciences (KNAW)
- ;
- AMOLF
- ARCNL
- DIFFER
- Delft University of Technology
- HFML-FELIX
- Holomicrobiome Institute
- Keygene
- Laigo Bio
- Max Planck Institute for Psycholinguistics
- NLR
- Netherlands Heart Institute
- Radix Trading LLC
- RiboPro B.V.
- SURF
- University of Groningen
- 32 more »
- « less
-
Field
- Computer Science
- Economics
- Engineering
- Medical Sciences
- Biology
- Science
- Mathematics
- Chemistry
- Materials Science
- Business
- Arts and Literature
- Humanities
- Psychology
- Social Sciences
- Electrical Engineering
- Linguistics
- Sports and Recreation
- Environment
- Earth Sciences
- Education
- Law
- Philosophy
- Physics
- Design
- 14 more »
- « less
-
protection strategies with inclusive governance models, this research project seeks to reconcile heritage security with social justice and participatory tourism development. This PhD position (DC-8) is
-
be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process of transitioning to a Matrix setup, which
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process of transitioning to a Matrix setup, which
-
basic screening before appointment, which will be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process
-
be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process of transitioning to a Matrix setup, which
-
description: The current overlapping crises - political polarization, the climate, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but
-
also active in public debate and is a devoted mentor to young researchers. Loe Schlicher Game Theory, Eindhoven University of Technology Loe Schlicher uses game theory to examine homeland security issues
-
eligible to access information, technology, and hardware which is subject to European or US export control and sanctions regulations & eligible to acquire the security clearance by their national security
-
before appointment, which will be conducted by an external background screening service, in compliance with the European Space Agency's security procedures. Note that ESA is in the process of transitioning