445 security-"https:"-"https:"-"https:"-"https:"-"Robert-Gordon-University" PhD positions
Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
- Technical University of Denmark
- Aalborg University
- NTNU - Norwegian University of Science and Technology
- Utrecht University
- University of Oslo
- Cranfield University
- University of Nottingham
- Duke University
- Nature Careers
- Newcastle University
- University of Southern Denmark
- Monash University
- Norwegian University of Life Sciences (NMBU)
- University of Texas at El Paso
- Technical University of Munich
- The University of Manchester
- Fraunhofer-Gesellschaft
- Queensland University of Technology
- UNIS
- University of Adelaide
- University of Birmingham
- University of Luxembourg
- University of Newcastle
- University of Twente
- Carnegie Mellon University
- Loughborough University;
- NTNU Norwegian University of Science and Technology
- Pennsylvania State University
- University of Melbourne
- University of Warwick
- ;
- IMDEA Networks Institute
- Leibniz
- Linköping University
- Nord University
- Umeå University
- Vrije Universiteit Brussel
- AIT Austrian Institute of Technology
- Cranfield University;
- Erasmus University Rotterdam
- Flinders University
- National Renewable Energy Laboratory NREL
- Oak Ridge National Laboratory
- OsloMet
- Trinity College Dublin
- Umeå universitet
- University of Birmingham;
- University of Florida
- University of North Texas at Dallas
- University of Sheffield
- University of Surrey
- Aalborg Universitet
- Aarhus University
- Aston University
- CSIRO
- Cardiff University
- DAAD
- DFG-TRR/CRC 298
- EPFL
- Eindhoven University of Technology
- Empa
- Fondazione Bruno Kessler
- Forschungszentrum Jülich
- Fundació per a la Universitat Oberta de Catalunya
- Ghent University
- Goethe University Frankfurt •
- Humboldt-Universität zu Berlin •
- IRTA
- Imperial College London;
- Institut polytechnique UniLaSalle
- Instituto Nacional de Investigação Agrária e Veterinária, I.P.
- Jönköping University
- KNAW
- King's College London
- King's College London;
- Lawrence Berkeley National Laboratory
- Loughborough University
- Lulea University of Technology
- MASARYK UNIVERSITY
- Manchester Metropolitan University
- Manchester Metropolitan University;
- Max Planck Institute of Biochemistry •
- McGill University
- Memorial Sloan-Kettering Cancer Center
- Middlesex University;
- Newcastle University;
- Northeastern University London
- Ruhr-Universität Bochum •
- Tallinn University of Technology
- Texas A&M AgriLife
- The Medicines And Healthcare Products Regulatory Agency;
- The Open University;
- The University of Arizona
- The University of Iowa
- Tilburg University
- UNIVERSITE DE TECHNOLOGIE DE COMPIEGNE
- Ulster University
- University of Agder
- University of Alaska
- University of Amsterdam (UvA)
- 90 more »
- « less
-
Field
- Computer Science
- Engineering
- Medical Sciences
- Economics
- Materials Science
- Biology
- Science
- Chemistry
- Electrical Engineering
- Linguistics
- Business
- Mathematics
- Humanities
- Social Sciences
- Arts and Literature
- Psychology
- Earth Sciences
- Education
- Environment
- Design
- Physics
- Sports and Recreation
- 12 more »
- « less
-
. The main task is to explore and implement novel efficient anonymous credential schemes which remain secure against quantum attackers. You should have: Master’s degree (or equivalent) in computer science or a
-
this role you may be required to obtain UK Security Clearance. Funding This studentship is open to both Home and Overseas fee status students, however we are only permitted to offer a limited number of
-
to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things
-
of strategic goods, services and technology. Candidates with the potential of not fulfilling requirement for security clearance, access clearance and authorization as described in the Act Relating to National
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
technology. Candidates with the potential of not fulfilling requirement for security clearance, access clearance and authorization as described in the Act Relating to National Security, The Export Control Act
-
increasing demands for safe and efficient operations due to growing traffic, more complex vessels, and higher safety requirements. Simulator-based training is essential for preparing maritime professionals
-
critical technologies, which, due to the risk of unwanted knowledge transfer, is subject to a number of security measures. Therefore, based on information from open sources, background checks may be
-
Australia's national science agency, we solve the greatest challenges through innovative science and technology. We put the safety and wellbeing of our people above all else and earn trust everywhere because we
-
computer simulations by developing fundamentally innovative and advanced protection strategies. To enhance the reliability and safety of low-voltage networks with a high penetration of power-electronic