58 computer-security-"https:"-"https:"-"https:"-"https:"-"Itä-Suomen-yliopisto" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
PhD Position in Categorical Foundations of Type Theory Faculty: Faculty of Science Department: Department of Information and Computing Sciences Hours per week: 36 to 40 Application deadline: 6
-
with modern machine learning. You will work on extending data-driven models with process-informed constraints and novel data integration strategies. The position is embedded in the Computational
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
. The core values of the Faculty of Humanities are professionalism, transparency, responsibility, connectedness and safety. These values apply to everyone and we uphold these values in our work and in our
-
scenario, given limited resources? The security situation in the world has changed rapidly since February 2022. Increasing threats also mean a reorientation for Defence: a renewed focus on warfighting, after
-
scholars who have made valuable and innovative contributions to science or scientific practice. These contributions may relate to the themes identified in the Recognition & Rewards programme : research
-
solve problems and identify opportunities, from a business as well as government perspective. U.S.E.’s Bachelor’s programme Economics & Business Economics offers students a solid foundation in economic
-
Science Theory and Methodology (ICS) Graduate School. external link Your qualities We are looking for an enthusiastic candidate, who has (almost) finished a Master programme in Sociology, Interdisciplinary
-
protection strategies with inclusive governance models, this research project seeks to reconcile heritage security with social justice and participatory tourism development. This PhD position (DC-8) is
-
occurs; and validating these approaches against community and industry benchmarks. The work combines network measurements, data science, and systems security, with an emphasis on reproducibility and real