Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The Research group Governance of Cyber Security at the Institute of Security and Global Affairs (ISGA) is
-
funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The Intelligence and Security Research Group at the Institute of Security and Global
-
, including PhD candidates, postdocs, and students, largely work together on three main themes: the energy transition, sustainable aerospace, and safety and security, with the aim of tackling climate change and
-
assessment within defence contexts, while also contributing to the academic literature on cyber security analytics. Where to apply Website https://www.academictransfer.com/en/jobs/359873/postdoctoral-position
-
addresses of two references who can provide letters of recommendation. A knowledge security check can be part of the selection procedure. (for details: national knowledge security guidelines ) Where to apply
-
an important contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and
-
three main themes: the energy transition, sustainable aerospace, and safety and security, with the aim of tackling climate change and contributing to the independence and security of Europe. When you join
-
examine affective metrics such as perceived safety, comfort, and opportunities for social interaction. The outcomes are synthesized into integrated multidisciplinary solutions that combine data-driven
-
, including policies, infrastructure, technology, safety, economic incentives, and public acceptance. You will be involved in three specific subprojects: Analyzing the employment effects of the green transition
-
application to Prof. dr. M.T.J. Spaan. Please note: You can apply online. We will not process applications sent by email and/or post. As part of knowledge security, TU Delft conducts a risk assessment during