Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Delft University of Technology (TU Delft)
- University of Groningen
- Wageningen University and Research Center
- Delft University of Technology (TU Delft); Delft
- University of Amsterdam (UvA); Amsterdam
- Radboud University
- University of Amsterdam (UvA)
- CWI
- Eindhoven University of Technology (TU/e)
- Delft University of Technology
- Erasmus University Rotterdam
- University of Groningen; Groningen
- University of Twente
- University of Twente (UT)
- Utrecht University
- 5 more »
- « less
-
Field
-
to smart navigation systems. However, realizing neuromorphic computing in practice presents significant challenges, particularly in the areas of energy efficiency, reliability, and security. The REACT MSCA
-
safety? Join our PhD project on the legal role of ‘trusted flaggers’, a key but underexplored mechanism in EU content moderation. Help shape how the Digital Services Act is interpreted and applied, as part
-
engineering, system engineering, or related fields. Solid background in process safety, quantitative risk assessment, and simulation methods. Experience in programming and/or safety analysis software. Familiar
-
cryptography guarantees better performance and faster speed for encrypting data. Without doubt, AES (Advanced Encryption Standard) and Keccak/SHA-3 (Secure Hash Algorithm 3) are the two most used and famous
-
information of two academic referees A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ). Only complete applications received within
-
transcripts Names and contact information of two academic referees A knowledge security check can be part of the selection procedure (for details: national knowledge security guidelines ). Only complete
-
—combining the compliance and safety of soft systems with the precision and performance required for impactful applications. The PhD candidate will be encouraged to actively shape the direction of the research
-
. For the final candidates, a knowledge security check will be part of the application procedure. For more information on this check, please consult Chapter 8 of the National Knowledge Security Guidelines . We
-
of two references who can provide letters of recommendation. A knowledge security check can be part of the selection procedure. (for details: national knowledge security guidelines ) Only complete
-
select technical industries. The analysis will focus on case studies from industries partnering with the project. This position is embedded in the Security, Technology and e-Privacy Research Group (STeP