435 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "U.S" "St" "St" positions at Monash University in Australia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Science
- Law
- Biology
- Education
- Linguistics
- Materials Science
- Mathematics
- Philosophy
- Humanities
- Arts and Literature
- Environment
- Chemistry
- Psychology
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Social Sciences
- 13 more »
- « less
-
of the U.S. workforce. We then consider various attributes of these occupations, as given by the Occupational Information Network (O*NET) data-base. Using a subset of these occupations, we survey a
-
interested in, please apply via our website and complete the online expression of interest form https://www.monash.edu/ research-ethics-and-integrity/ animal-ethics/accordion- content/accordion_1 For further
-
We have a range of potential research projects on offer in partnership with VIFM - https://www.vifm.org/ - looking at ML techniques in predicting forensic diagnoses / image analysis, across
-
analysis, contextual analysis, audio feature extraction, and machine learning models to identify and assess potentially dangerous content. Similarly, computer vision models are implemented to analyse images
-
wastage. These improvements should provide significant benefits, such as reducing severe losses due to cybercrimes and enhancing national security for Australians. [1] Darban, Z. Z., Webb, G. I., Pan, S
-
speech recognition, and autonomous driving, etc. However, due to the intrinsic vulnerability and the lack of rigorous verification, DL systems suffer from quality and security issues, such as the Alexa
-
Artificial Intelligence (AI) models are widely used in decision making procedures in many real-world applications across important areas such as finance, healthcare, education, and safety critical
-
Conventional x-ray imaging is firmly established as an invaluable tool in medicine, security, research and manufacturing. However, conventional methods extract only a fraction of the sample
-
intelligent techniques for scheduling and offloading tasks to the cloud and peer vehicles. This will ultimately meet the Quality of Service (QoS) requirements of time-critical road safety applications and
-
management, distributed computing, and energy-aware computing, preparing them for impactful roles in industry and research. Key Components and Example Scenarios Predictive Resource Allocation and Load