1,162 search results for “Computer security” in the Public website
-
Computability of the étale Euler-Poincaré characteristic
Promotor: S.J. Edixhoven, L.D.J. Taelman
-
Maritime Security
The project 'Policing the high seas: maritime law-enforcement in a multi-actor environment' aims to identify the gaps in the legal framework for EU activities in the maritime security domain, and specifically in the areas of combating piracy, human smuggling or trafficking and drug trafficking.
-
Computer support group
The Computer Support group provides dedicated support for the computing infrastructure of Leiden Observatory
-
Computational Drug Discovery
Research in this group, headed by Gerard van Westen, focusses on computational methods integrated in different parts of the drug discovery process. More specifically, topics include innovative treatments for cancer, selectivity modeling, translational research, allosteric modulation, drug resistance…
- Peace & Security
-
Cyber Security (MSc)
The executive master’s programme in Cyber Security of Leiden University takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Advanced Computing and Systems (MSc)
The master's specialisation Bioinformatics at Leiden University focuses on research, development and application of computational tools and approaches for expanding the use of biological, medical, behavioral and health data.
-
Shades of grey: cyber intelligence and (inter)national security
This paper examines cyber intelligence in the context of national and international security.
-
Computer Science and Education (MSc)
The master’s specialisation Computer Science and Education at Leiden University prepares students to teach the subject of biology to secondary school students. The programme comprises a one-year Computer Science component, followed by an education component in the second year.
-
Data Science: Computer Science (MSc)
The master's specialisation Data Science: Computer Science at Leiden University provides students thorough knowledge and understanding of statistical and computational aspects of data analysis, including their application in databases, advances in data mining, networks, pattern recognition, and deep…
-
ALICE High Performance Computing facility
High Performance Computing (HPC) is becoming ever more important as a research tool in many research areas across all research domains. A University facility, providing serious computational capabilities, combined with easy and flexible local access, is a strong advantage for these research areas. It…
-
Crisis and Security Management: Intelligence and National Security (MSc)
Are you thinking about studying Crisis and Security Management: Intelligence and National Security? Learn more and watch the videos.
-
Tim Wuisman
Faculty Governance and Global Affairs
-
Under Construction. Cognitive and Computational Aspects of Extended Lexical Units
This dissertation investigates Extended Lexical Units (ELUs), elements that are bigger than just one word and which are stored in the Lexicon.
-
Security and threat
Polarisation in our society is on the rise. What makes people increasingly radical? How do we protect ourselves from extremist, terrorist or criminal threats, be they physical or in the cyber world? And what role do intelligence services play in this?
-
Computer Science at Leiden University
Leiden Institute of Advanced Computer Science (LIACS)
-
Large-scale Computing Infrastructure
Large-scale computing infrastructure, such as supercomputers, cluster, and clouds, are already pervasive, most members of our society interact with them daily: social networks, government services, media streaming services--all systems heavily interfacing with the members of our society--are powered…
-
Security Studies (BSc)
In the Bachelor’s in Security Studies you study 21st century security challenges and learn to devise strategic solutions to a complex world.
-
2024 Conference on International Cyber Security: Democracy and Cyberspace
Conference
-
Computational modeling of angiogenesis: from matrix invasion to lumen formation
Promotor: Roeland M.H. Merks
- Conflict, Peace and Security
-
Computational speedups and learning separations in quantum machine learning
This thesis investigates the contribution of quantum computers to machine learning, a field called Quantum Machine Learning. Quantum Machine Learning promises innovative perspectives and methods for solving complex problems in machine learning, leveraging the unique capabilities of quantum computers…
-
BSc Security Studies
On this page you will find all information about the Bachelor of Security Studies that you need as a first-year student.
-
Social Resilience and Security
As our society becomes increasingly complex, it is critical that we better understand how we can deal with fundamental issues such as societal and personal security, and resilience against threats to our security.
-
Methods to simulate fermions on quantum computers with hardware limitations
This thesis is a collection of theoretical works aiming at adjusting quantum algorithms to the hardware of quantum computers.
-
MODOMA: A computer-simulated laboratory-approach towards language acquisition
The goal of the MODOMA-project is to create a computer model of language acquisition.
-
Executive Master Cyber Security
The executive Master’s Programme Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.
-
Social Resilience and Security
Social resilience and security has never been more important. Over the last 2 years, the COVID-19 pandemic has created a considerable disturbance to our personal and social lives. As a result, the general population reports more stress, loneliness and decreased quality of life. At the same time, there…
-
Sixth edition of the European Cyber Security Perspectives
On 12 March 2019, KPN published the sixth edition of the European Cyber Security Perspectives. Sergei Boeke, researcher at the Institute of Security and Global Affairs, has written an article about Cyber Warfare.
-
Computational aspects of class group actions and applications to post-quantum cryptography
Most of current public-key cryptography is considered insecure against attacks from sufficiently powerful quantum computers. Post-quantum cryptography studies methods to secure information resistant against such attacks. One proposal is isogeny-based cryptography, which bases its security on computational…
-
Leiden Institute of Advanced Computer Science
Digital technology is changing academia and society at lightning speed. LIACS is in the midst of this with groundbreaking research into data processing and artificial intelligence (AI). It conducts a unique combination of fundamental and applied research into major issues facing academia and society…
-
Bioinformatics Data analytics Computational Biology
LUMC Technology Focus Area (TFA) Data Analytics is een samenwerkingsverband van verschillende onderzoeksgroepen in het LUMC die nieuwe kwantitatieve en computationele methodologie ontwikkelen voor biomedisch en klinisch onderzoek.
-
Machine learning and computer vision for urban drainage inspections
Sewer pipes are an essential infrastructure in modern society and their proper operation is important for public health. To keep sewer pipes operational as much as possible, periodical inspections for defects are performed.
-
Crisis and Security Management
You are about to start your Master's programme in Crisis and Security Management at Leiden University in The Hague, The Netherlands. Make sure you are well prepared and get your studies off to a good start.
-
Computer Science and Science Communication & Society (MSc)
The master’s specialisation Computer Science and Science Communication and Society at Leiden University bridges the gap between experts and the public by combining high quality research in computer science with extensive training in science communication.
-
On the computation of norm residue symbols
An algorithm is discussed to compute the exponential representation of principal units in a finite extension field F of the p-adic rationals.
-
Crisis and Security Management (MSc)
Crises arising from terrorism, cyber threats, and natural disasters dominate world news and make Crisis and Security Management a heavily politicized and hotly debated topic at the top of the national and global societal and governance agenda.
-
NExt ApplicationS of Quantum Computing (NEASQC)
The NEASQC project brings together academic experts and industrial end-users to investigate and develop a new breed of Quantum-enabled applications that can take advantage of NISQ (Noise Intermediate-Scale Quantum) systems in the near future. NEASQC is use-case driven, addressing practical problems…
-
Women in International Security - NL
Women in International Security -Netherlands (WIIS-NL) is an affiliate of WIIS Global. WIIS-NL Members include: professionals, civil servants, academics, NGOs, employees of international bodies and organizations, embassy staff, politicians, students, and interested members of the general public. The…
-
Computational modeling of cellular dynamics in tumor cell migration
Epithelial-mesenchymal plasticity (EMP) and tumor cell migration play an important role in cancer progression, and an improved understanding of the mechanisms underlying these concepts is essential for developing new targeted approaches.
-
Intelligence and National Security (MSc)
In the track Intelligence and National Security you will be introduced to intelligence and security services in their political, societal, and bureaucratic contexts. The track will give you a thorough understanding of the modus operandi of these agencies, their interaction with the surrounding world,…
- Centre for Computational Life Sciences (CCLS)
-
Why is there no Northeast Asian security architecture?
Why is there no Northeast Asian security architecture? Assessing the strategic impediments to a stable East Asia. In this article, published in 'The Pacific Review', the authors Wang (Peking University) en Stevens (Leiden University) discuss the reasons why.
-
Criminology and Security Policy (MSc)
Criminology and Security Policy is a challenging Dutch-taught master's programme at the renowned Leiden Law School of Leiden University. This programme – with its multidisciplinary perspective - focuses on the security issues in society and the development of effective and legitimate policy in order…
-
Lena Riecke
Faculty Governance and Global Affairs
-
Crisis and Security Management (MSc)
Are you thinking about studying Crisis and Security Management? Learn more and watch the introduction video. Or watch the videos on the track-related pages.
-
Introduction webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar