138 computer-security "https:" "https:" "https:" "https:" "UCL" positions at University of Luxembourg
Sort by
Refine Your Search
-
The University of Luxembourg invites applications for a fully funded doctoral position in mathematical and computational modelling within the framework of the doctoral training unit Forest Function
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services
-
on neurodegenerative processes and are especially interested in Alzheimer’s and Parkinson’s disease and their contributing factors. The LCSB recruits talented scientists from various disciplines: computer scientists
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
scalable multilingual AI systems. TruX conducts research in software security, software repair, and explainable software to create key practical solutions for developers, allowing them to achieve
-
, reliability, and AI-assisted software workflows, with validation on real-world datasets from open-source and industry. TruX conducts research in software security, software repair, and explainable software
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
SnT carries out interdisciplinary research in secure, reliable and trustworthy ICT (Information and Communication Technologies) systems and services, often in collaboration with governmental
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services