Fully-funded PhD studentships in Cybersecurity. It has become increasingly apparent that the challenges that arise from the integration of emerging technologies into existing social, commercial, legal and political systems will not be resolved by specialists working in isolation. Read more
Today, it’s impossible to deploy effective cybersecurity defence layers without relying heavily on machine learning. There are several reasons why machine learning considered so crucial to cybersecurity. Read more
ONLY OPEN TO AUSTRALIAN DOMESTIC STUDENTS. Fortify Australia’s manufacturing sector . Australian manufacturers are facing a plethora of cybersecurity challenges from vulnerabilities across their IT infrastructure and processes. Read more
Using several messenger applications like Signal where data are not backed up or stored reduces the chance of messages being accessed, but the main problem of the data being created and consumed in cleartext on end devices remains. Read more
For information security, software algorithms or hardware protocols are generally adopted. Software algorithms use pseudo-random numbers generated from one-way mathematical functions. Read more
Most organisations/companies use bug bounty hunting programs to identify and then fix security vulnerabilities in their systems. Bounty hunters, in return for a reward, address cybersecurity flaws faced by organisations/companies before criminals/state-sponsored hackers exploit them. Read more
With the time, the intruders are becoming more intelligent with higher ability of attacking networks without being identified. Multi-modal machine learning-based intelligent intrusion detection systems must be designed to identify stealthy and adversarial cyber attacks. Read more
Please note that advertised projects are sample projects and prospective applicants are not required to apply to one of the advertised projects, but are welcome to discuss broader research interests with the academic named in the advert - and/or to apply with their own research proposal. Read more
The increasing interconnectivity between information systems, communications, and the electricity grid gives rise to numerous benefits, but it also amplifies the impact of potential threats, both intentional and unintentional. Read more
We are seeking motivated graduates to join our Centre for Doctoral Training (CDT) in Cyber Security from September 2023 with one of our fully-funded PhD studentship (tax free stipend £20,890 , tuition fees paid and a research grant of £2,500 per year). Read more
We are seeking motivated graduates to join our Centre for Doctoral Training (CDT) in Cyber Security from September 2023 with one of our fully-funded PhD studentship (tax free stipend £20,890 , tuition fees paid and a research grant of £2,500 per year). Read more
Cyberattacks on Critical National Infrastructure (CNI) appear to be growing in occurrence and strength and Operational Technology (OT) networks have gradually become targets of attack for cyber criminals and state-sponsored hackers. Read more
*Offer only available for the duration of your active subscription, and subject to change. You MUST claim your prize within 72 hours, if not we will redraw.
Create your myFindAPhD account to add this PhD to your shortlist to register for this event to receive updates on upcoming events
Due to your Facebook privacy settings, we were unable to create your account at this time. Please select another method to sign up.
We were unable to log you in with your Google account at this time. If you have third-party cookies blocked, please enable them, refresh, and try again.
We were unable to log you in with your Google account at this time. If you have third-party cookies blocked, please enable them, refresh, and try again.
Continue with Facebook
Looking to list your PhD opportunities? Log in here.