109 computer-security "https:" "https:" "https:" "https:" "UCL" PhD positions at Nature Careers
Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
, computer science, medicine, pharmacology, and physics. ISAS is a member of the Leibniz Association and is publicly funded by the Federal Republic of Germany and its federal states. At our location in
-
as a key target for future therapeutic and preventative measures. MICRO-PATH is a competitive, interdisciplinary PhD programme supported by the PRIDE scheme of the Luxembourg National Research Fund
-
The Bernhard Nocht Institute for Tropical Medicine (http://www.bnitm.de/en ) is the largest Research Institute for Tropical Medicine in Germany and is the National Reference Centre for Tropical
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and
-
established Systems Neuroimmunology Laboratory at LMU Munich (www.m-kaufmann.com ) is seeking a motivated and creative PhD candidate passionate about combining immunologic methods and advanced computational
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular
-
, public authorities in their decisions and businesses in their strategies. Do you want to know more about LIST? Check our website: https://www.list.lu/ How will you contribute? You will develop a multi
-
DTU’s Tenure Track program. Read more about the program and the recruitment process here . You can read more about career paths at DTU here . Further information Further information may be obtained from
-
academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and