178 computer-security "https:" "https:" "https:" "https:" "https:" "Dr" "Keele University" positions in Luxembourg
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
research outcomes through publications in top-tier international conferences and journals Contribute to research proposal writing and actively support the group’s efforts in securing competitive national and
-
Wilmes at the Luxembourg Centre for Systems Biomedicine (UL) and Rob Finn at EMBL-EBI in the UK, both involved in the identification of VFs through computational biology, as well as Kim Remans at EMBL in
-
As a Research Associate (Postdoc) in the Ubiquitous and Intelligent Systems (UBIX) Research Group at the University of Luxembourg’s Interdisciplinary Centre for Security, Reliability and Trust (SnT
-
assessment instruments are combined to gain a differentiated insight into family influence processes. The project is led by Prof. Dr. Anna Kornadt (Uni Luxembourg), Prof. Dr. Michaela Riediger and Dr. Antje
-
administrative tasks within the department (up to a limited percentage of time) For ruther information about the role please contact Dr. Carolina Catunda: carolina.catunda@uni.lu
-
backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network security, information assurance, satellite systems, vehicular
-
developing effective interventions in the context of health and well-being For further information about the role, please contact: Prof. Dr. Anna Kornadt, Head of Department of Behavioural and Cognitive
-
, medicine), with a primary focus on the four year Midwifery Sciences Bachelor program. The holder will be involved in the selection of students, the establishment of the training plan, preparation and
-
cyber-security, including applications and security of LLMs.
-
! Education · PhD in computer science, engineering, applied mathematics, physics, or another STEM discipline. · Demonstrated experience with mathematical and numerical optimization methods