Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
on software for safety-critical functions like life support, monitoring, and decision-making. They must comply with strict regulations (e.g., IEC 62304, ISO14971) that require trial-based safety assessments
-
ISAC system robustness against various types of jamming. Integrated Sensing and Communication (ISAC) systems are becoming a key enabling technology for next‑generation wireless networks. However, these
-
-generation into medical device software development processes. You will be trained to carry out research that combines software engineering, formal methods, and safety assurance. You are not expected to have
-
% STFC:25% UoW split), gaining experience in algorithm development, experimental validation, software engineering, and scientific communication. Training opportunities include international workshops
-
20 Jan 2026 Job Information Organisation/Company Instituto de Telecomunicações Department Instituto de Telecomunicações Research Field Engineering » Electronic engineering Researcher Profile
-
explore the design of Software Defined Networks (SDN) control planes for quantum systems. The candidate will be part of the Marie Skłodowska-Curie Action project ‘QUESTING’, a groundbreaking Doctoral
-
26 Jan 2026 Job Information Organisation/Company Delft University of Technology (TU Delft) Research Field Computer science » Informatics Computer science » Programming Medical sciences » Medicine
-
which can be exploited by malicious actors. This project will be conducted in the Software Engineering and Security (SES) group. The student will conduct an in-depth investigation of a class of
-
software engineering, computer science, data science, bioengineering, bioinformatics, engineering, physics or related Experience in either machine learning or computational biology. Interest in both
-
malicious actors. This project will be conducted in the Software Engineering and Security (SES) group. The student will conduct an in-depth investigation of a class of vulnerabilities and devise static and/or