398 computer-security-"https:"-"https:"-"https:"-"https:" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Law
- Science
- Education
- Linguistics
- Materials Science
- Biology
- Humanities
- Mathematics
- Arts and Literature
- Environment
- Chemistry
- Philosophy
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Psychology
- Social Sciences
- 13 more »
- « less
-
Clinical Innovation and Informatics Stream Coordinator Job No.: 686703 Location: 553 St Kilda Road, Melbourne Employment Type: Part-time, fraction (0.6) Duration: 12 month fixed-term appointment
-
find some of our publications here: https://i.giwebb.com/research/computational-biology/ Required knowledge A solid grounding in artificial intelligence and machine learning. Learn more about minimum
-
Technical Officer- Student Teams, Risk and Safety Job No.: 684981 Location: Clayton campus Employment Type: Full-time Duration: Continuing appointment Remuneration: $96,768 – $104,450 pa HEW 06
-
Lecturer/ Senior Lecturer - Electrical and Computer Systems Engineering Job No.: 688022 Location: Clayton campus Employment Type: Full-time Duration: Continuing appointment Remuneration: $114,951
-
, software, human-computer interaction, ...). We also work very much interdisciplinarily with colleagues from other faculties, e.g. on bio-diversity matters, on physical aspects, on modelling aspects, and on
-
package should be prioritised are surprisingly difficult computational tasks. State-of-the-art high-performance algorithms are used to calculate routes for the vehicles in order to minimise costs and
-
Centre for Health Economics, Monash Business School, Integrated PhD Program 2027 Fully Funded 4.5-Year PhD in Health Economics - Monash University (Melbourne, Australia) Job no.: 625101 Location
-
cooperating with each other, but in many cases competing for individual gains. This structure may not always work for the benefit of science. The purpose of this project is to use game theory and computational
-
speech recognition, and autonomous driving, etc. However, due to the intrinsic vulnerability and the lack of rigorous verification, DL systems suffer from quality and security issues, such as the Alexa
-
analysis, contextual analysis, audio feature extraction, and machine learning models to identify and assess potentially dangerous content. Similarly, computer vision models are implemented to analyse images