Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
of the results of this work, by producing scientific publications for international journals and conferences. Consult the detailed job description Where to apply Website https://institutminestelecom.recruitee.com
-
., Zheng, G., & Srikumar, V. (2017). DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning. Proceedings of the ACM Conference on Computer and Communications Security (CCS). [6] Kwon
-
disruptions—its mining and availability, making the development of innovative recovery strategies essential to secure supply chains and mitigate agriculture’s environmental footprint. This study wants
-
, specifically within the IRISA/Sotern teams, in cooperation with the LAB-STICC/Iris, all two experts research groups in network security. In collaboration with the project team and under the supervision
-
and protocols for next-generation networks (B5G/6G, Internet of Things, SDN/NFV, constrained systems), the resilience and security of critical infrastructures, security-by-design for hardware and
-
through systematic experimental campaigns Job description & project sheet for more information Where to apply Website https://institutminestelecom.recruitee.com/l/en/o/post-doctorat-en-cybersecurit
-
the research activities of the team: SOTERN and of the laboratory IRISA and the department SRCD. The scientific activities of this department are related to Network Systems, Cyber Security and Digital Law. The