92 information-security-"https:"-"https:"-"https:"-"https:"-"https:"-"UCL"-"UCL" positions in United Arab Emirates
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
produced over 180 publications and 20 language resources and tools. The lab website is http://www.camel-lab.com/ . Google Scholar of the lab is at http://scholar.camel-lab.com/ . The position will target
-
Description The Robot Learning & Control Lab (REAL Lab) at NYU Abu Dhabi is seeking an outstanding Post-Doctoral Associate to contribute to cutting-edge research in robot intelligence, machine
-
Advisors who excel at coaching students to secure great jobs opportunities around the world. This role will be based out of our Dubai Campus, focusing on the UAE and wider GCC market in a lean, all hands-on
-
characterizing the interaction between sensing and communication. The PDA is also expected to contribute to optical channel modeling, particularly for comparative analysis with THz bands, where RF signals exhibit
-
Description The Division of Science at New York University Abu Dhabi is looking to recruit a post-doctoral associate, starting Fall 2026 to work under the supervision of Prof. Pierre Youssef
-
models for signal transmission and reception, derivation of fundamental performance limits, algorithmic-level system design, and performance evaluation through computer simulations and/or experimental
-
Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) is a research-focused university in Abu Dhabi, and the first university dedicated entirely to the advancement of science through AI
-
Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) is a research-focused university in Abu Dhabi, and the first university dedicated entirely to the advancement of science through AI
-
Physics, Spectral Theory, Quantum Chaos, Large Graphs and Quantum Walks. Related areas such as Quantum Information can also be considered. This position is offered through the research funds of Mostafa
-
complex sociotechnical systems Strategic learning and equilibrium-seeking algorithms in transportation networks Game-theoretic approaches to cybersecurity and security games Integration of human behavior