44 computer-security-"https:"-"https:"-"https:"-"UCL" positions at Utrecht University
Sort by
Refine Your Search
-
description: The current overlapping crises - political polarization, the climate, and security fears - present challenges for mental health and well-being. Engaging in collective action is one way to cope, but
-
which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer
-
background, neurodiversity, gender, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can
-
, Computer science, Ontology engineering, Computational geoscience, AI and NLP, or a related field; a strong interest in conceptual modelling, semantic modelling, ontology engineering, formal logics or cognitive
-
Doctoral Network (MSCDN) uniting leading European universities, hospitals, research institutes and industry partners. It trains 15 PhD candidates in an interdisciplinary programme covering genetics
-
inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent
-
, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection
-
, sexual orientation, disability or age. We strive to create a safe and inclusive environment in which everyone can flourish and contribute. Knowledge security screening can be part of the selection
-
the project is expected to result in several highly impactful publications. We offer an exciting opportunity to contribute to an ambitious and research programme within a highly motivated team and to
-
everyone can flourish and contribute. Knowledge security screening can be part of the selection procedures of academic staff. We do this, among other things, to prevent the unwanted transfer of sensitive