64 lecture-cyber-security PhD positions at Technical University of Denmark in Denmark
Sort by
Refine Your Search
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
processors. Enabling safe, secure and real-time automotive functionalities in the RISC-V world, RIGOLETTO will establish the foundation for a next-generation Automotive Computing Platform based on the open
-
structural design, 3D printing robots, sensors, safe and efficient human machine interfaces, processing units, and software components into a cyber physical construction system. The result would be
-
irrespective of age, gender, disability, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export
-
. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates
-
technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. The Department of Chemistry performs
-
to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates
-
in critical technology, which is subject to special rules for security and export control, open-source background checks may be conducted on qualified candidates for the position. Technology for people
-
, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background
-
, race, religion or ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background