Sort by
Refine Your Search
-
understand, explain and advance society and environment we live in. Your role Conduct research and prepare a doctoral thesis in metabolic network modelling and computational epigenomics Develop novel methods
-
The SigCom research group of SnT, headed by Prof. Symeon Chatzinotas, focuses on wireless/satellite communications and networking. The research areas focus on the formulation, modeling, design, and
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
of improved workflows in field studies These tasks will be carried out within the Marie Skłodowska-Curie Doctoral network METAMIC 3 - Metaproteome-based leveraged microbiome management in the context of One
-
security. This project investigates how blockchain analytics and data engineering can enhance the detection of illicit activities across these decentralised and increasingly complex networks. By deploying
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security
-
attracting highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security