340 computer-security-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of Sheffield
Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
committed to cross-team working, contributing to service wide and cross-department planning. You will be integral to ensuring that cross-programme initiatives, such as mentoring and tutoring, are embedded
-
Detection and Mitigation of Malicious Content Smuggling in GenAI Models (S3.5-COM-Zhao) School of Computer Science PhD Research Project Competition Funded Students Worldwide Dr Cass Zhixue Zhao
-
Development and Validation of a Multimodal Wearable Headband for Objective Bruxism Monitoring Using Machine Learning (S3.5-DEN-Boissonade)
-
intervention models will lead to suboptimal decisions, potentially jeopardising the safety of a structure and increasing the costs. Traditional approaches to machine learning establish correlations between some
-
Bugging Out: When AI loses the Plot – Detecting and Taming Hallucinations in LLM-Generated Code (S3.5-COM-Wang)
-
Explainable and Causal AI for Visual Analytics in Regenerative and Climate-Smart Agriculture (C3.5-COM-Cruz Villa-Uriol)
-
Adversarial machine learning - Identification and prevention of cyber-physical attacks on infrastructure (S3.5-MAC-Champneys)
-
Dynamic skewness in longitudinal data models School of Mathematical and Physical Sciences PhD Research Project Self Funded Dr Miguel Juarez Application Deadline: Applications accepted all year round Details Panel (longitudinal) data enables learning the dynamics and relations of (groups of)...
-
, manuscripts, and grant applications. Mentor and support PhD students or research technicians where appropriate. Maintain compliance with health, safety, ethical, and regulatory requirements in the laboratory
-
qualitative coding of interview data. References Berkenkotter, C., Huckin, T. N. and Ackerman, J. (1988). Conventions, conversations, and the writer: Case study of a student in a rhetoric Ph.D. program