426 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "U.S" "St" "St" "St" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Law
- Science
- Education
- Linguistics
- Materials Science
- Biology
- Humanities
- Mathematics
- Philosophy
- Arts and Literature
- Environment
- Chemistry
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Psychology
- Social Sciences
- 13 more »
- « less
-
. For more information on the work we do, please visit our website: http://www.monash.edu/vpfinance The Opportunity The Strategic Sourcing Manager position is an important role that drives the development and
-
package should be prioritised are surprisingly difficult computational tasks. State-of-the-art high-performance algorithms are used to calculate routes for the vehicles in order to minimise costs and
-
Project Manager - PANTHER TRIAL Job No.: 688710 Location: 553 St Kilda Road, Melbourne Employment Type: Full Time Duration: 12 month fixed-term appointment Remuneration: $120,138 - $132,610 pa HEW 8
-
Metallurgy and Corrosion cluster, working within a multidisciplinary team spanning theory, advanced characterisation, and computational modelling. This environment provides an excellent platform for developing
-
Centre for Health Economics, Monash Business School, Integrated PhD Program 2027 Fully Funded 4.5-Year PhD in Health Economics - Monash University (Melbourne, Australia) Job no.: 625101 Location
-
Metallurgy and Corrosion cluster, working within a multidisciplinary team spanning theory, advanced characterisation, and computational modelling. This environment provides an excellent platform for developing
-
, computational modelling, and data-driven alloy design to: Understand the mechanisms of local austenite-to-ferrite transformation in low-alloy steels; Develop frameworks to predict and control
-
of the U.S. workforce. We then consider various attributes of these occupations, as given by the Occupational Information Network (O*NET) data-base. Using a subset of these occupations, we survey a
-
speech recognition, and autonomous driving, etc. However, due to the intrinsic vulnerability and the lack of rigorous verification, DL systems suffer from quality and security issues, such as the Alexa
-
analysis, contextual analysis, audio feature extraction, and machine learning models to identify and assess potentially dangerous content. Similarly, computer vision models are implemented to analyse images