441 computer-security "https:" "https:" "https:" "UCL" "UCL" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Science
- Business
- Humanities
- Law
- Biology
- Education
- Linguistics
- Materials Science
- Philosophy
- Arts and Literature
- Mathematics
- Environment
- Psychology
- Chemistry
- Sports and Recreation
- Design
- Earth Sciences
- Electrical Engineering
- Social Sciences
- 13 more »
- « less
-
. For more information on the work we do, please visit our website: http://www.monash.edu/vpfinance The Opportunity The Strategic Sourcing Manager position is an important role that drives the development and
-
Metallurgy and Corrosion cluster, working within a multidisciplinary team spanning theory, advanced characterisation, and computational modelling. This environment provides an excellent platform for developing
-
wastage. These improvements should provide significant benefits, such as reducing severe losses due to cybercrimes and enhancing national security for Australians. [1] Darban, Z. Z., Webb, G. I., Pan, S
-
This project draws on a recent Dagstuhl Seminar (https://www.dagstuhl.de/en/program/calendar/semhp/?semnr=18322) that brought together leading experts from industry and academia, including those who
-
Artificial Intelligence (AI) models are widely used in decision making procedures in many real-world applications across important areas such as finance, healthcare, education, and safety critical
-
. The result will be a thesis in the field of interaction design, contributing to our understanding of experiencing the human body as play. For more info see http://exertiongameslab.org
-
Conventional x-ray imaging is firmly established as an invaluable tool in medicine, security, research and manufacturing. However, conventional methods extract only a fraction of the sample
-
management, distributed computing, and energy-aware computing, preparing them for impactful roles in industry and research. Key Components and Example Scenarios Predictive Resource Allocation and Load
-
speech recognition, and autonomous driving, etc. However, due to the intrinsic vulnerability and the lack of rigorous verification, DL systems suffer from quality and security issues, such as the Alexa
-
Hoven (elisevandenhoven.com). See also our dedicated post about this on our website. For more information see http://exertiongameslab.org The result will be a thesis in the field of interaction design.