63 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dip" "Dip" uni jobs at University of Lund in Sweden
Sort by
Refine Your Search
-
have the task of being SI leader. We are looking for experienced students who study on our master's programme in Service management. Description of the work place You are employed at the Department
-
available at https://www.lusem.lu.se/organisation/department-economics/doctoral-studies-department-economics/application-phd-programme-economics. , save it and send it to phd_recommendation@nek.lu.se
-
projects. More information about the doctoral programme is available on the department’s website: (https://www.iko.lu.se/en/research/doctoral-studies). Eligibility General eligibility for third-cycle
-
Description of the workplace The doctoral student will be employed at the Department of Computer Science, where research on engineering of large-scale software-intensive systems is conducted in
-
subject is divided into a range of sub-disciplines and specialisations. The PhD programme at the Department of Biology includes many of these specialisations, from molecular biology to applied ecology, from
-
Description of the workplace The Division of Secure and Networked Systems within the Department of Electrical and Information Technology works broadly with research within Cryptography, Computer
-
broadly with research within Cryptography, Computer Security, Wireless and Fixed Networks. The security group has around 20 members. The main research directions are Cryptography, Privacy and System
-
and humidity monitoring and cooling control. We are looking for a student to work on the implementation of this environmental and safety control. To be successful in this role you need to have the
-
systems, Applied AI/ML, Computer Security and Cryptography. The division runs several research projects through different large research collaboration platforms and arranges extensive workshops and seminar
-
an emphasis on large-scale and/or distributed methods and systems. Central aspects include scalable methods with well‑founded analysis of, for example, computational and communication cost, convergence and