Search
Clear all filters
j.taylor avatar
@j.taylor
Real-time Jammer Detection in Internet-of-Things Networks
Real-time Jammer Detection in Internet-of-Things Networks

About the Project Jammers are devices that transmit signals on the same radio frequencies as Internet-of-Things (IoT) devices, affecting performance and causing severe degradations to IoT communication efforts. The situation … Read More Read More

Categories:
jjgreen avatar
@jjgreen
Quantum Machine Learning to Secure Internet of Medical Things
Quantum Machine Learning to Secure Internet of Medical Things

About the Project Applications are invited for a self-funded, 3-year full-time or 6-year part time PhD project. The PhD will be based in the School of Computing and will be … Read More Read More

Categories:
jjgreen avatar
@jjgreen
Intrusion Prevention utilising Generative AI
Intrusion Prevention utilising Generative AI

About the Project Applications are invited for a self-funded, 3-year full-time or 6-year part time PhD project. The PhD will be based in the School of Computing and will be … Read More Read More

Categories:
zoe-tl avatar
@zoe-tl
Utilisation of Machine Learning for Intrusion Detection in IoT Networks
Utilisation of Machine Learning for Intrusion Detection in IoT Networks

About the Project This project would have a staring point of investigating the use of Machine Learning in Intrusion Detection in the various aspects of IoT networks. This may be … Read More Read More

Categories:
peter.o9 avatar
@peter.o9
PhD Position on Energy Systems Modeling
PhD Position on Energy Systems Modeling

PhD Position on Energy Systems Modeling (ref. BAP-2025-83) Laatst aangepast: 04/02/25 At the division of Applied Mechanics and Energy Conversion (TME) of the Department of Mechanical Engineering at KU Leuven, … Read More Read More

Category:
raelynm avatar
@raelynm
A Generative Large Language Model for Encrypted Network Traffic Classification
A Generative Large Language Model for Encrypted Network Traffic Classification

About the Project Network traffic identification holds paramount importance, particularly in distinguishing various forms of encrypted traffic including protocols, applications, services, and malicious flows. Identifying encrypted traffic encompasses intricate levels … Read More Read More

Categories:
raelynm avatar
@raelynm
Large Language Model Powered Deception Defense Approach Approach
Large Language Model Powered Deception Defense Approach Approach

About the Project The Deception Defense strategy, such as a honeypot system, is employed to draw in malicious activities, understand the attacker community’s tactics, and proactively provide defense. However, there’s … Read More Read More

Categories:
j.taylor avatar
@j.taylor
Theoretical aspects of interconnection networks for supercomputers and data centres
Theoretical aspects of interconnection networks for supercomputers and data centres

About the Project My research involves theoretical aspects of the interconnection networks that provide a communications fabric for supercomputers and data centres (more details can be found on my website … Read More Read More

Categories:
jjgreen avatar
@jjgreen
Classifications of Evidence in the SpiderNet
Classifications of Evidence in the SpiderNet

About the Project Applications are invited for a self-funded, 3-year full-time or 6-year part time PhD project. The PhD will be based in the School of Computing and will be … Read More Read More

Categories: