1,162 search results for “Computer security” in the Public website
-
Introduction webinar cyber security
Study information, Webinar
-
Introduction webinar cyber security
Study information, Webinar
-
Introductie webinar cyber security
Study information, Webinar
-
Applications of topology to Weyl semimetals and quantum computing
This thesis covers various applications of topology in condensed matter physics and quantum information.
-
Postdoc Computational Modeling for Drug Safety Prediction
Science, Leiden Academic Centre for Drug Research (LACDR)
-
Olga Gadyatskaya
Science
-
Leiden Embedded & Real-time Computing (LERC)
Leiden Embedded & Real-time Computing (LERC) is an expert lab and leader in advanced research on embedded and real-time systems and software. The main mission of LERC is by its research to contribute in a highly innovative way to the system-level design of embedded and cyber-physical systems and software…
-
Labour Law and Social Security
The Labour Law and Social Security department provides both bachelor’s level and master’s level teaching.
-
Explicit computations with modular Galois representations
Promotor: S.J. Edixhoven
- Leiden Institute of Advanced Computer Science
-
Institute of Security and Global Affairs
The Institute of Security and Global Affairs (ISGA) focuses on multidisciplinary research and education within the international scientific field of security studies.
-
Integrating cellular and tissue dynamics with cell fate decisions through computational modeling
There is a need for alternative methods to replace, reduce and refine (3R) animal experimentation. Combining experimental data from high-throughput in vitro studies with in silico modeling is a promising approach to unravel the effect of chemicals on living cells and to gain a better understanding of…
-
About the programme
As a student in Security Studies you are a socially engaged critical thinker eager to study real-life security cases in an academic setting. You focus not just on the broad context of these issues but also on the role of government, institutions and media. Want to know more? Sign up for one of our Open…
-
Institute of Security and Global Affairs
The Hague is the international city of peace, justice and security – making it the logical place for the Institute of Security and Global Affairs (ISGA) to reach partners from ministries, governments and NGOs with research into issues relating to security.
-
Student for a Day - MSc Crisis and Security Management, spec. Governance of Radicalism, Extremism, and Terrorism
Study information
-
Pellikaan & Van Willigen, Bilateralism and Nuclear Security
Political scientists Huib Pellikaan and Niels van Willigen (Leiden University) use and elaborate on the theoretical insights from game theory in order to understand nuclear security in changing environment. Now that the relations between the US and Russia have deteriorated and smaller nuclear states…
-
Maaike Beemsterboer
Faculty Governance and Global Affairs
-
The Hague Program on International Cyber Security
Taking the changing landscape of international cyber security and cyber conflict as a point of departure, The Hague Program on International Cyber Security focuses on the various modes of governance that states and other actors can bring into play to deal with and shape the strategic changes and challenges…
-
Crisis and Security Management: Cybersecurity Governance (MSc)
Are you thinking about studying Crisis and Security Management: Cybersecurity Governance? Learn more and watch the videos.
-
Institute of Security and Global Affairs
The Institute of Security and Global Affairs (ISGA) currently only offers courses to a limited number of exchange students from partner universities of ISGA and the Faculty of Governance and Global Affairs (FGGA).
-
Artifical intelligence gets a boost from quantum computing
Machine learning - on classical computers- has made great progress in the past five years. Computer translation of speech and text is just one example. In Leiden, some researchers expect that machine learning, empowered by quantum systems, even if they only contain a few dozen qubits, can lead to a…
- Localizing the Women Peace & Security Agenda
-
the preference hypervolume: an interactive model for real world computational co-creativity
In this thesis it is posed that the central object of preference discovery is a co-creative process in which the Other can be represented by a machine. It explores efficient methods to enhance introverted intuition using extraverted intuition's communication lines.
-
membranes and materials for solar-to-fuel devices: a multiscale computational approach
In the current global context, there is a pressing need to address sustainable energy supplies to safeguard our Planet and its ecosystems. The choices made by human society have a significant impact on genetic evolution and climate.
-
Segments and rules: a comparative study into the computational mechanisms underlying language acquisition
In this project we study the properties of statistical- and rule-learning mechanisms in relation to the acquisition and evolution of language. We ask to what extent these mechanisms are unique to humans - or to human language - by comparing the acquisition of vocal structure in two species: humans (infants)…
-
Of ticking bombs: Western security services against political violence and terrorism
How have British, Dutch, and German security services dealt with political violence and terrorism since the late 1960s; to what extent did they consider these new phenomena as a task and how have they developed activities in order to counter these security threats?
-
Food. Rethinking global security. Earth's Future.
Today, humanity produces sufficient calories, in theory, to feed the 7.7 billion people on the planet: the amount of food produced per person on the planet has gone up more than 40% since the 1960s. Yet, ironically, the prevalence of undernourishment – which had been declining for decades – has started…
-
A piece of the Universe in the computer
Simulations of galaxies help researchers understand astronomical observations better. The EAGLE simulation, a large project in which Leiden astronomers play a leading role, shows the evolution of the Universe, from just after the Big Bang to the present day.
-
Quantum computation with Majorana zero modes in superconducting circuits
Promotor: C.W.J. Beenakker, Co-Promotor: A.R. Akhmerov
-
Non-Abelian metamaterials: emergent computing and memory
In the traditional theory of linear elasticity, superposition dictates that the response of a material does not depend on the sequence of the applied mechanical actuations.
-
Computational modeling of mycobacterium infection and innate immune reponse in zebrafish
Promotor: Prof.dr. J.N. Kok
-
Cyber Security Governance Essentials
The new minor 'Cyber Security Governance Essentials' will start in September 2021. Third year bachelor students of The Leiden Institute of Advanced Computer Science (LIACS) and of the BSc Security Studies of the Institute of Security and Global Affairs (ISGA) who would like to deepen their knowledge…
-
Computational optimisation of optical projection tomography for 3D image analysis
Optical projection tomography (OPT) is a tomographic 3D imaging technique used for specimens in the millimetre scale.
-
ECOLE: Experience-based COmputation: Learning to optimisE
Researchers of the Leiden Institute of Advanced Computer Science (LIACS) will develop a training programme the next generation of early stage researchers (ESRs). During a four years project they will be trained to approach industrial challenges in a holistic manner by developing solutions in an automotive…
-
Towards High Performance and Efficient Brain Computer Interface Character Speller: Convolutional Neural Network based Methods
A P300-based Brain Computer Interface character speller, also known as P300 speller, has been an important communication pathway, under extensive research, for people who lose motor ability, such as patients with Amyotrophic Lateral Sclerosis or spinal-cord injury because a P300 speller allows human-beings…
-
Multiple Paths. Towards a Performance Practice in Computer Music
This thesis proposes multiple paths towards the development of a performance practice in Computer Music.
-
Scientific computing for Drug Discovery in Python and/or R
Data analysis with Python and R are rapidly becoming essential skills for modern scientists. Therefore, we are offering courses to develop your scientific computing skills. Those courses are optional for LACDR PhD candidates.
-
Unconditionally secure cryptographic protocols from coding-theoretic primitives
This dissertation presents new cryptographic protocols, which can be divided into two families.
-
Holger Hoos
Science
-
Stephan Raaijmakers
Faculty of Humanities
-
Computational Approaches to Disease, Signaling and Drug Targets
The Minor Computational Approaches to Disease, Signaling and Drug Targets (CADSDT) is focused on fundamental scientific research required for discovery of new drug targets and development of new drugs.
-
Fuzzy systems and unsupervised computing: exploration of applications in biology
In this thesis we will explore the use of fuzzy systems theory for applications in bioinformatics.
-
Reconstruction and Computational Modelling for Inherited Metabolic Diseases
Accelerating the diagnosis and personalising the management of inherited metabolic diseases.
-
DiGiuseppe & Kleinberg, ‘Economics, security, and individual-level preferences for trade agreements’
Citizens’s attitudes towards trade are not only about the (perceived) economic effect. Commerce also has a variety of security implications. Employing an original experiment, political scientists Matthew DiGiuseppe (Leiden University) and Katja Kleinberg (Binghamton University) demonstrate that security…
- The Eroding Legitimacy of Security Institutions in West Africa
-
Europe as A Global Actor? – The Common Security and Defence Policy in Question
My research project aims to analyze reasons of the European Union’s (EU) inadequacy to develop a strong Common Security and Defense Policy (CSDP) with regard to the role of main EU member states, namely Germany and the United Kingdom (UK) and find the answer of how the EU overcome the CSDP question…
-
Kristian Rietveld
Science
-
Ahmed Al-Yousefi
Faculty Governance and Global Affairs
-
Joeri Lammerts
Faculty Governance and Global Affairs
-
Frans Osinga
Faculty Governance and Global Affairs