17 information-security "https:" "https:" "https:" "Dr" PhD scholarships in United Kingdom
Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
this research area to https://www.warwick.ac.uk/engineeringscholarships/ng_epsrc/app via the above 'Apply' button. If this initial application is successful, we will invite you to submit a formal application
-
Application deadline: 30/04/2026 Research theme: Nuclear Engineering How to apply: https://uom.link/pgr-apply-2425 This 3.5-year PhD project is fully funded; home students are eligible to apply
-
employment policies. For further information on the WIRe scheme visit the web site at: https://cdtwire.com/ The project based at The University of Sheffield will be supervised by academics at Sheffield and
-
also visit Dr Vincenzo Abbate’s website for more information: Vincenzo Abbate - King's College London Application deadline: For prospective students interested in our PhD project, applications
-
, and offer a range of family friendly, inclusive employment policies. For further information on the WIRe scheme visit: https://cdtwire.com/ The project will be supervised by Dr Andy Nichols, Professor
-
PhD studentship in Computer Science: From Formal Requirements to Specification-based Automated Testing for Safety-Critical Medical Device Software Certification Award Summary 100% fees covered, and
-
). Additional project costs will also be provided. Overview Offshore Floating Wind (OFW) is key to unlocking deep-water renewable energy and achieving the global Net Zero targets. However, dynamic power cables
-
to an expert committee from the University of Nottingham as part of a competitive process to secure the funding. How to apply: Fill out this form: https://forms.office.com/e/SxNLR1qbBE?origin=lprLink , answer
-
Application deadline: 31/03/2026 Research theme: Nuclear Materials Hoe to apply: https://uom.link/pgr-apply-2425 UK only This 4-year PhD project is fully funded by the Nuclear Decommissioning
-
that you apply early as the advert may be removed before the deadline. The cryptographic protocols used to secure communications and data are safe under the assumption that problems like integer