117 information-security "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" positions at University of Lund in Sweden
Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
, econometrics, applied microeconomics, and macroeconomics. For more information, please visit: https://www.lusem.lu.se/organisation/department-economics/research Job Assignments The holders of these positions
-
well as in the everyday activities of the project, including reporting to FORMAS. More information about the project: https://portal.research.lu.se/en/projects/power-and-polarisation-in-swedish-forestry-from
-
normative acts—often beyond parliamentary oversight—are used in authoritarian regimes to regulate public life. The research will explore legal fragmentation, governance mechanisms, and informal hierarchies
-
Subject description Biology is the broad subject about all living things. It encompasses everything from processes at the molecular and cellular level to global processes at ecosystem level. The
-
Lund University was founded in 1666 and is repeatedly ranked among the world’s top universities. The University has around 46 000 students and 8 500 staff based in Lund, Helsingborg and Malmö. We
-
Lund University was founded in 1666 and is repeatedly ranked among the world’s top universities. The University has around 46 000 students and 8 500 staff based in Lund, Helsingborg and Malmö. We
-
Lund University was founded in 1666 and is repeatedly ranked among the world’s top universities. The University has around 46 000 students and 8 500 staff based in Lund, Helsingborg and Malmö. We
-
Lund University was founded in 1666 and is repeatedly ranked among the world’s top universities. The University has around 46 000 students and 8 500 staff based in Lund, Helsingborg and Malmö. We
-
and Information Technology at Lund University, the Faculty of Engineering, LTH, works broadly with research within Cryptography, Computer Security, Wireless and Fixed Networks. The security group has
-
, reinforcement learning and data‑driven control methods, adaptive methods, safe/robust learning‑based control, and methodologies for stability, safety, and performance. Application‑driven method development