1,162 search results for “Computer security” in the Public website
-
Cyber Governance and National Security: Intervening in Ungoverned Spaces
The Netherlands Ministry of Defense and Ministry of Security and Justice have requested the Centre for Terrorism and Counterterrorism to complete a research project on cyber governance from a policy perspective. The results of this project will contribute to the deliverables of the fourth International…
-
A History of the National Security State in Turkey
Zeynep Sarlak defended her thesis on 25 August 2020
-
Crisis and Security Management: Governance of Violence (MSc)
Are you thinking about studying Crisis and Security Management: Governance of Violence? Learn more and watch the videos.
-
Crisis and Security Management: Governance of Crisis (MSc)
Are you thinking about studying Crisis and Security Management: Governance of Crisis? Learn more and watch the videos.
-
Crisis and Security Management: War and Peace Studies (MSc)
Are you thinking about studying Crisis and Security Management: War and Peace Studies? Learn more and watch the videos.
-
Online Course Safety & Security Challenges in a Globalized World
Security and safety challenges rank among the most pressing issues of modern times. Challenges such as cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. The course will introduce you to this broad theme in an increasingly complex world.
-
immigrants no more? The securitization of immigration in the National Security Strategies of the United States of America
This article studies the securitization of immigration in the United States of America (U.S.), through the analysis of the National Security Strategies (NSS) published between 2002 and 2017, using a two-layered analytical framework that combines securitization theory and agenda setting theory.
-
Shielding software systems: A comparison of security by design and privacy by design based on a systematic literature review
The authors systematically search and review relevant definitions of Security by Design (SbD) in comparison with Privacy by Design (PbD).
-
Securing the integrity of financial markets in times of crisis
The Hazelhoff Centre for Financial Law research programme for 2020-2023 centres around the integrity of financial markets during times of crisis and possible regulation to secure it.
-
Intstitute of Security and Global Affairs participation at OSCE
On June 9-10 2016 Dr. E. Devroe of the Institute of Security and Global Affairs (ISGA) was invited as a key-note speaker on ‘Intelligence Led policing and community oriented policing’ at the annual meeting of the ‘Organization for Security and Co-operation in Europe’ (OSCE), Transnational Threats Department,…
-
A computational study of structural and excitonic properties of chlorosomes
The long-held desire - to link structure directly to function and to explain molecular mechanisms based on basic chemical or physical principles - is finally coming closer, satisfying not only our scientific curiosity but also offering new solutions to the many challenges in the field of health, energy…
-
EU Justice Home Affairs Agencies: Securing Good Governance
Dr Madalina Busuioc has completed a study for the European Parliament titled
-
Computational approaches to dissociative chemisorption on metals: towards chemical accuracy
We review the state-of-the-art in the theory of dissociative chemisorption (DC) of small gas phase molecules on metal surfaces, which is important to modeling heterogeneous catalysis for practical reasons, and for achieving an understanding of the wealth of experimental information that exists for this…
-
Nonparametric Bayes for high-dimensional models: contraction, credible sets, computations
Nonparametric Bayes for high-dimensional models: contraction, credible sets, computations
-
Agnes Schneider
Faculteit Archeologie
-
Fan Zhang
Science
-
Postdoc Automated Reasoning in Quantum Computing (0.8-1.0 FTE)
Science, Leiden Institute of Advanced Computer Science (LIACS)
-
The use of computational toxicology in hazard assessment of engineered nanomaterials
Assessing the risks of engineered nanomaterials (ENMs) solely on the basis of experimental assays is time-consuming, resource intensive, and constrained by ethical considerations (such as the principles of the 3Rs of animal testing). The adoption of computational toxicology in this field is a high p…
-
Rutger Leukfeldt
Faculty Governance and Global Affairs
-
Clara Cotroneo
Faculty Governance and Global Affairs
-
Bas Rietjens
Faculty Governance and Global Affairs
-
Pieter Tops
Faculty Governance and Global Affairs
-
Securing Humanitarian Operations: Preparedness and Response to Cyber Crises in Aid Delivery
How do humanitarian organisations adapt cyber incidents to their specific priorities and needs, and how can they adapt strategies of other organisations?
-
Handbook of Natural Computing
Natural Computing is the field of research that investigates both human-designed computing inspired by nature and computing taking place in nature, i.e., it investigates models and computational techniques inspired by nature and also it investigates phenomena taking place in nature in terms of information…
-
pharmacokinetics-pharmacodynamics in zebrafish: integration of experimental and computational methods
The zebrafish is a promising vertebrate model organism in early drug discovery and development.
-
Observing what cannot be observed: computational electrochemistry from carbon to hydrogen
In this thesis, we consider various (electro)chemical phenomena at surfaces and nanoparticles and their underlying atomistic processes, which we studied using first-principles methods such as density functional theory.
-
Synthetic, Physical and Computational Chemistry of Propeller-shaped Polycyclic Aromatic Hydrocarbons
This thesis systematically studies the physicochemical properties of non-planar, propeller-shaped, polycyclic aromatic hydrocarbons. The synthesis of several so-called propellerenes is described on a gram scale, using optimized procedures aimed at using less hazardous reagents and reducing the amount…
-
Damien Van Puyvelde
Faculty Governance and Global Affairs
-
Jennifer Dowling
Faculty Governance and Global Affairs
-
Parto Mirzaei
Faculty Governance and Global Affairs
-
Private active cyber defense and (international) cyber security—pushing the line?
This article on private active cyber defense by Dennis Broeders is part of a special issue of the Journal of Cybersecurity, based on a selection of contributions taken from the 2019 Conference on Cyber Norms organized by The Hague Program for Cyber Norms.
-
A community computational challenge to predict the activity of pairs of compounds
Source: Nat Biotechnol, Volume 32, Issue 12, pp. 1213-22 (2014)
-
Raoel Nanhekhan
Faculty Governance and Global Affairs
-
Joachim Koops
Faculty Governance and Global Affairs
-
Towards relevant quantum computers
Can we use quantum computers in a way that is also relevant to society? With the help of a 2-million-euro NWA grant, Leiden University will work with partners such as Surf, Google and Volkswagen to demonstrate that quantum computers are also of value outside the lab.
-
Secure and Efficient Computing on Private Data
Lecture
-
Ben van Werkhoven
Science
-
Human Security and Conflict in Ukraine: Local Approaches and Transnational Dimensions
The project investigates the implementation of policies and practices related to reconciliation and the strengthening of government capacity in the Odesa and Kharkiv regions of Ukraine.
-
Smart Cities: An Ethnographic Approach to Sensing Infrastructures in Security Practices
Smart digital infrastructures predicated on myriads of sensors distributed in the environment are often rendered as key to contemporary urban security governance to detect risky or suspicious entities before or during a criminal event takes place. At the same time, they often involve surveillance of…
-
Crisis and Security Management: Governance of radicalism, extremism and terrorism (MSc)
Are you thinking about studying Crisis and Security Management: Governance of radicalism, extremism and terrorism? Learn more and watch the videos.
-
Everyday justice and security provision for displaced and residents in Bukavu, DR Congo
How does the presence of internally displaced people impact on the justice and security concerns of longer-term residents in host communities, and to what extent do residents have different concerns than displaced?
-
Major Expansion Leiden Quantum Computing
The 18.8 million euro NWO Zwaartekracht grant for quantum software which Amsterdam, Delft and Leiden landed collectively, means for Leiden University among others the appointment of two new permanent scientific staff members, who will each form their own research group, divided among Computer Science,…
-
Computational, biochemical, and NMR-driven structural studies on histone variant H2A.B
Nature uses a special class of histone proteins, histone variants, to modulate the properties of chromatin at defined genomic locations.
-
Light on the quantum computer
Physicist Martin van Exter works with light at nanoscale, at the forefront of nanocomputer research. But as Director of Education he also has a vision for physics teaching. Inaugural lecture 18 November.
-
Bibi van den Berg
Faculty Governance and Global Affairs
-
René van der Veer
Faculteit der Sociale Wetenschappen
-
Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy
In this article for Studies in Conflict & Terrorism, the authors analyse the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG).
-
Small-State Influence in EU Security Governance: Unveiling Latvian Lobbying Against Disinformation
Sophie Vériter explores a small state’s impact on EU security governance, a hard challenge means against big states in this policy area.
-
Jentzsch, Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War
Political scientist Corinna Jentzsch (Leiden University) about the organisation of rebel and government auxiliaries in the civil war in Mozambique (1976–1992).
-
High-field neuroimaging of computational processes that drive cognitive control.
How do humans control their thoughts and actions, and what can high-field brain scanning reveal about the underlying processes?