Analysing Cryptography in the WildPost My JobLondon, United KingdomStudent / Phd JobsCloses: Jul 7, 2026
Securing LLM Use in Critical National Infrastructure-Adjacent DomainsPost My JobLondon, United KingdomStudent / Phd JobsCloses: Jul 7, 2026
Developing Next-Generation Attack Surface Mapping TechniquesLancaster UniversityBailrigg, Lancaster LA1 4YW, UKStudent / Phd JobsCloses: Jul 7, 2026
Robust and Lightweight Authentication for IoT NetworksEdinburgh Napier University9 Sighthill Ct, Edinburgh EH11 4BN, UKStudent / Phd JobsCloses: Jul 7, 2026
Human Factors and Behaviour Change Interventions for CybersecurityEdinburgh Napier University9 Sighthill Ct, Edinburgh EH11 4BN, UKStudent / Phd JobsCloses: Jul 7, 2026
Defeating complex families of malware using evolutionary based adversarial learningEdinburgh Napier University9 Sighthill Ct, Edinburgh EH11 4BN, UKStudent / Phd JobsCloses: Jul 7, 2026
Large Language Models for Vulnerability DetectionEdinburgh Napier University9 Sighthill Ct, Edinburgh EH11 4BN, UKStudent / Phd JobsCloses: Jul 7, 2026
Determining Cyber Attacks by Using Machine Learning to Detect Message AnomaliesUniversity of WorcesterWorcester WR2 5JN, UKStudent / Phd JobsCloses: Jul 7, 2026
Information Security in AI AgentsUniversity of WorcesterWorcester WR2 5JN, UKStudent / Phd JobsCloses: Jul 7, 2026
AI-Driven Cloud Security: Advancing Sustainable and Zero Trust Frameworks through AutomationKingston University55-59 Penrhyn Rd, Kingston upon Thames KT1 2EE, UKStudent / Phd JobsCloses: Jul 7, 2026
Cybersecurity Risk Assessment and Mitigation in artificial Intelligence life cycleKingston University55-59 Penrhyn Rd, Kingston upon Thames KT1 2EE, UKStudent / Phd JobsCloses: Jul 7, 2026
Development, Analysis, and AI-Augmentation of Steganographic Blockchain Protocols in Conjunction with Secure Multi-party Computation for Enhanced Privacy and SecurityKingston University55-59 Penrhyn Rd, Kingston upon Thames KT1 2EE, UKStudent / Phd JobsCloses: Jul 7, 2026
Security and Privacy of Energy-Constraint Internet of Things Communication using Distributed AIKingston University55-59 Penrhyn Rd, Kingston upon Thames KT1 2EE, UKStudent / Phd JobsCloses: Jul 7, 2026
Securing AI-Enhanced Health Data Management Systems Against Adversarial Attacks Over 6G NetworksKingston University55-59 Penrhyn Rd, Kingston upon Thames KT1 2EE, UKStudent / Phd JobsCloses: Jul 7, 2026
Post-quantum cryptographic systems for securing communication in IoT systems.Kingston University55-59 Penrhyn Rd, Kingston upon Thames KT1 2EE, UKStudent / Phd JobsCloses: Jul 7, 2026
Advancing Fully Homomorphic Encryption for privacy-preserving applicationsRoyal Holloway, University of LondonRoyal Holloway, University of LondonStudent / Phd JobsCloses: Jun 30, 2026
Autonomous Multi-Agent Cyber Defence at Scale: Detection, Coordination and ResponseCardiff UniversityCardiff, UKStudent / Phd JobsCloses: Jul 6, 2026
Early Detection of Distributed File-less Malware Using Vision Transformers (VC2644)University of the West of ScotlandHamilton International Technology Park, Stephenson Pl, Blantyre, Glasgow G72 0LH, UKStudent / Phd JobsCloses: Jun 15, 2026
AI-Enhanced Threat Intelligence Sharing against Online Harm and Crypto Crimes: Privacy-Preserving Analytics and Public-Private Coordinated Response and RecoveryAston UniversityAston St, Birmingham B4 7ET, UKStudent / Phd JobsCloses: May 18, 2026
Quantum-Resilient Security for Safety-Critical Vehicular Systems (MALIKH_U26CMP)University of East AngliaResearch Park, Norwich NR4 7TJ, UKStudent / Phd JobsCloses: Jul 6, 2026