109 information-security "https:" "https:" "https:" "https:" "https:" "U.S" positions at University of Lund
Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
well as in the everyday activities of the project, including reporting to FORMAS. More information about the project: https://portal.research.lu.se/en/projects/power-and-polarisation-in-swedish-forestry-from
-
you are expected to acquire basic knowledge of Swedish during the employment period. More information about the doctoral programme is available at: https://www.soclaw.lu.se/en/research/doctoral-studies
-
normative acts—often beyond parliamentary oversight—are used in authoritarian regimes to regulate public life. The research will explore legal fragmentation, governance mechanisms, and informal hierarchies
-
Subject description Biology is the broad subject about all living things. It encompasses everything from processes at the molecular and cellular level to global processes at ecosystem level. The
-
Information Technology works broadly with research within Cryptography, Computer Security, Wireless, and Fixed Networks. The security group has around 20 members. The main research directions are Cryptography
-
Information Technology conducts broad research in cryptography, computer security, wireless and wired networks. The Security Group has around 20 members. The main research areas are cryptography, privacy, and
-
and Information Technology at Lund University, the Faculty of Engineering, LTH, works broadly with research within Cryptography, Computer Security, Wireless and Fixed Networks. The security group has
-
Lund University was founded in 1666 and is repeatedly ranked among the world’s top universities. The University has around 46 000 students and 8 500 staff based in Lund, Helsingborg and Malmö. We
-
, research on new cell concepts and cell manufacturing, battery systems and system integration, recycling, and safety. At Lund University with the Faculty of Engineering (LTH), COMPEL is a strategic initiative
-
, reinforcement learning and data‑driven control methods, adaptive methods, safe/robust learning‑based control, and methodologies for stability, safety, and performance. Application‑driven method development