University of Manchester Featured PhD Programmes
Imperial College London Featured PhD Programmes
University of Kent Featured PhD Programmes
University of Glasgow Featured PhD Programmes
University of Reading Featured PhD Programmes
"cyber" AND "security"×
10 miles

cyber security PhD Projects, Programs & Scholarships

We have 29 cyber security PhD Projects, Programs & Scholarships

  • "cyber" AND "security" ×
  • clear all
Order by 
Showing 1 to 10 of 29
  Can We Visualise Cyber Security Like the Weather? (BUCKLEYO1U19SF)
  Dr O Buckley
Application Deadline: 31 May 2019
Cyber security is a complex subject, which often requires a high-level of technical understanding to fully appreciate a given situation and to make the appropriate decisions going forwards.
  Design, Implementation and Evaluation of Non-Cooperative Game Theoretic Models for Cyber Security
  Dr E Pfluegel
Applications accepted all year round
Cyber security is the assessment of, responding to and monitoring of the security of the cyberspace. It is difficult to pin down to one single scientific discipline, but rather relates to a number of domains and fields such as physical security, network security, security assessment frameworks and the human element.
  MRes Scholarship: Realistic CNI Cyber Security Exercising
  Prof A Blyth
Application Deadline: 27 January 2019
*This is a KESS 2 East scholarship opportunity. Please note the eligibility information in the advert text or contact the team for further information.*.
  Adaptive Security Threat Detection for Small Footprint Computing Devices within Industrial Control Systems, Intelligent Homes, Medical Devices & Smart Infrastructure
  Dr A Winckles, Dr M Graham
Applications accepted all year round
Research Group. Cyber Security and Networking Research Group. https://www.anglia.ac.uk/science-and-technology/research/our-research-institutes-and-groups/cyber-security-and-networking-research-group.
  Research on application of cybersecurity for Identity Management in ‘lite’ communications in remote or emergency situations
  Mr M Griffiths
Application Deadline: 20 January 2019
*This is a KESS 2 East scholarship opportunity. Please note the eligibility information in the advert text or contact the team for further information.*.
  DTC CS 19 - Formal Models for Cyber Security Analysis
  Dr P James
Applications accepted all year round
Traditionally, formal methods have been used to analyse security protocols. This project will consider modelling various security vulnerabilities/attacks and using these to analyse the best form of defence against such attacks.
  PhD studentship in Satellite Systems Security - developing an understanding of Security Risks and requirements associated with Off-The-Shelf Components and Ground Control Systems
  Dr M Manulis, Dr C Bridges
Applications accepted all year round
Surrey Centre for Cyber Security (SCCS) and Surrey Space Centre (SSC) at the University of Surrey invite applications for a fully-funded PhD studentship in Satellite System Security to work on an industry-funded research project TargetSat.
  Post-Quantum Cryptography
  Prof D Kahrobaei
Applications accepted all year round
Applications are open for a PhD studentship looking at Post-Quantum Cryptography. Research supervision. If successful, you will conduct your research under the supervision of the Chair of Cyber Security Professor Delaram Kahrobaei.
  PhD Studentship in Verification of security and privacy in modern communication protocols
  Dr I Boureanu, Dr S Schneider
Applications accepted all year round
The student will join a team of researchers at Surrey University’s Centre for Cyber Security (SCCS), supervised by Dr Ioana Boureanu, in collaboration with Prof.
  PhD Studentship Opportunity Security Analysis of Systems using Emerging 5G Technologies (5GTech-Sec)
  Research Group: 5G Innovation Centre
  Dr I Boureanu
Applications accepted all year round
5GTech-Sec will undertake the formal security & privacy analysis of 5G-systems against 5G-specific security and privacy risks. e.g., threats stemming from reconfigurable networks, arbitrary number of connections to a small cell, etc.
Show 10 15 30 per page


FindAPhD. Copyright 2005-2019
All rights reserved.