406 computer-security-"https:"-"https:"-"https:"-"UCL"-"UCL" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Law
- Science
- Education
- Linguistics
- Materials Science
- Biology
- Humanities
- Mathematics
- Arts and Literature
- Environment
- Chemistry
- Philosophy
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Psychology
- Social Sciences
- 13 more »
- « less
-
cooperating with each other, but in many cases competing for individual gains. This structure may not always work for the benefit of science. The purpose of this project is to use game theory and computational
-
speech recognition, and autonomous driving, etc. However, due to the intrinsic vulnerability and the lack of rigorous verification, DL systems suffer from quality and security issues, such as the Alexa
-
analysis, contextual analysis, audio feature extraction, and machine learning models to identify and assess potentially dangerous content. Similarly, computer vision models are implemented to analyse images
-
intelligent techniques for scheduling and offloading tasks to the cloud and peer vehicles. This will ultimately meet the Quality of Service (QoS) requirements of time-critical road safety applications and
-
wastage. These improvements should provide significant benefits, such as reducing severe losses due to cybercrimes and enhancing national security for Australians. [1] Darban, Z. Z., Webb, G. I., Pan, S
-
Artificial Intelligence (AI) models are widely used in decision making procedures in many real-world applications across important areas such as finance, healthcare, education, and safety critical
-
welfare, safety, hygiene and procedural efficiency Your attention to detail, professionalism and commitment to ethical practice will directly support MARP’s ability to deliver high-quality services to its
-
Conventional x-ray imaging is firmly established as an invaluable tool in medicine, security, research and manufacturing. However, conventional methods extract only a fraction of the sample
-
, the role contributes to the effective delivery of secure, reliable, and fair assessment experiences for all students. This position will be responsible for planning, implementing and coordinating complex
-
management, distributed computing, and energy-aware computing, preparing them for impactful roles in industry and research. Key Components and Example Scenarios Predictive Resource Allocation and Load