Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
safety technology projects. Knowledge of computer vision techniques for object detection and tracking (YOLO, OpenCV). Experience with RF signal analysis or spectrum monitoring.
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
currently have positions available at all levels, from Lecturer to Full Professor, in the following areas: Information Security: Mobile/distributed systems security, Cyber Physical Systems security, security
-
interaction, communication, or psychology. Masters or Ph.D. in Human-Computer Interaction (HCI), Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology will be advantageous
-
, or psychology. Masters or Ph.D. in Human-Computer Interaction (HCI), Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology will be advantageous. Strong interest and passion in
-
applicants will take place from March to April 2026. Awards for intake 2026 will be finalised by July 2026. Supported Areas for START Infocomm Technology Information Security: Mobile security, cyber-physical
-
, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software
-
good relevant industry experience, who are committed to nurturing the next generation of professionals in areas such as: Information Security: Mobile security, cyber-physical systems, security analytics
-
. Supported Areas for START - Infocomm Technology Information Security: Mobile security, cyber-physical systems, IoT security, security analytics, operational cybersecurity, digital forensics, vulnerability
-
be finalised by July 2026. Supported Areas for START Infocomm Technology Information Security: Mobile security, cyber-physical systems, IoT security, security analytics, operational cybersecurity