Sort by
Refine Your Search
-
existing vulnerability-mining tooling to ensure precise commit-level alignment and reproducibility. 2. Formalization and Extension of Security-Preserving Perturbations (Month 2-3) - Collect/define and
-
building automated systems or ML pipelines – 15% Demonstrated experience implementing structured, scalable, or automated software systems. Evidence of experience with neural networks, LLMs, or training
-
(Month 3-4) Define robustness metrics for security classification consistency. Evaluate resilience to obfuscation, control-flow changes, and API variations. Compare robustness performance across different
-
and open-source release of training and evaluation pipelines. The selected candidate will be integrated into a research team with established expertise in software security, program analysis, and AI
-
Computer Science and Engineering Experience on programming languages such as Python, Java and Go Knowledge of cyber security techniques for overlay networks EVALUATION CRITERIA The selection will be based
-
: OBJECTIVES | FUNCTIONS Create a Local Area Network in which laboratory equipment has fixed IP addresses - Use SCPI (Standard Commands for Programmable Instruments) commands accepted by each laboratory device
-
Computer Science (or close field) with strong foundations in data management, machine learning, and software engineering. Coursework or projects in NLP/LLMs, information retrieval, knowledge graphs/ontologies, data
-
Computer Science (or close field) with strong foundations in data management, machine learning, and software engineering. Coursework or projects in NLP/LLMs, information retrieval, knowledge graphs/ontologies, data
-
project team at INESC-ID is working on the development of specific components for the OpenSSD-V platform, focusing on hardware/software co-design and circuit synthesis for ASIC/FPGA. The objective