70 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"UCL" PhD positions in Netherlands
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate
-
scenario, given limited resources? The security situation in the world has changed rapidly since February 2022. Increasing threats also mean a reorientation for Defence: a renewed focus on warfighting, after
-
solve problems and identify opportunities, from a business as well as government perspective. U.S.E.’s Bachelor’s programme Economics & Business Economics offers students a solid foundation in economic
-
Science Theory and Methodology (ICS) Graduate School. external link Your qualities We are looking for an enthusiastic candidate, who has (almost) finished a Master programme in Sociology, Interdisciplinary
-
University , two communities are related to the DCC. The Water, Climate and Future Deltas (WCFD) is one of the thematic communities of the Pathways to Sustainability programme. The WFCD community is a platform
-
variables PhD position in small area estimation in the context of multisource data (probability and nonprobability data) The first position will be assigned to work package 1 (part B): Computing composite
-
team players who want to play an active role in an inter- and transdisciplinary research community and training programme Our offer a job for 1 year, with an extension to a total of four years upon
-
part of the National Growth Fund programme “Ombion-CPBT”, which is a national centre for valorizing and disseminating animal-free innovations and expertise in the biomedical domain. The PhD project
-
. The Faculty has six departments: Biology, Pharmaceutical Sciences, Information & Computing Sciences, Physics, Chemistry and Mathematics. Together, we work on excellent research and inspiring education. We
-
occurs; and validating these approaches against community and industry benchmarks. The work combines network measurements, data science, and systems security, with an emphasis on reproducibility and real