-
: -Federated learning -Secure multi-party computation -Homomorphic encryption -Blockchain-based provenance and audit mechanisms Develop a subsystem or service that provides “security-by-design” recommendations
-
impact on critical infrastructure. It will involve the simulation of various complex high-stakes cyber-threat scenarios to help train individuals in decision-making, strategy formulation, and teamwork. By
-
that have developed corporate liability (EU law) to develop a dedicated corporate liability regime. Contrary to previous (PhD) research into corporate criminal liability and ICL, this project will focus
-
their time to research and 20 percent to teaching. In this way, you can work on further developing your academic career. The research is situated at the intersection of public administration and legal history
-
from jurisdictions (e.g., Japan) that demonstrate a slant towards adopting more “developer-friendly” copyright regimes? How should we determine authorship of G-AI output and impute liability
-
to bridge current gaps in academic work through a thorough study in the field of EU regulation to foster living wages, in view of recent legal developments. The PhD candidate is able to further develop an own