Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
is carried out in accordance with the principles of the State Employees Act , and Export control (legislation that regulates the export of knowledge, technology and services). Candidates who, after
-
. The University of Bergen is subjected to the regulation for export control system. The regulation will be applied in the processing of the applications. If the university has not received the assessment from
-
, and Export control (legislation that regulates the export of knowledge, technology and services). Candidates who, after assessment of the application and attachments, are considered to be in conflict
-
, and Export control (legislation that regulates the export of knowledge, technology and services). Candidates who, after assessment of the application and attachments, are considered to be in conflict
-
principles of the State Employees Act , and Export control (legislation that regulates the export of knowledge, technology and services). Candidates who, after assessment of the application and attachments
-
carried out in accordance with the principles of the State Employees Act , and Export control (legislation that regulates the export of knowledge, technology and services). Candidates who, after assessment
-
, and Export control (legislation that regulates the export of knowledge, technology and services). Candidates who, after assessment of the application and attachments, are considered to be in conflict
-
Engineering or any other related field. You must meet the requirements to access and perform research on dual-use technologies according to Norwegian regulations on Control of the Export of Strategic Goods
-
prerequisite that you are physically present and available to the institution on a daily basis. The appointment is carried out in accordance with the principles of the State Employees Act , and Export control
-
leader will be the Head of Department. About the project Modern control systems rely on being at least partially predictive while digital twins also must maintain a state model of the targeted cyber