| ²é¿´: 1554 | »Ø¸´: 3 | |||
anjutalq°æÖ÷ (ÕýʽдÊÖ)
|
[½»Á÷]
´ú¶û·òÌØÀí¹¤²©Ê¿Ö°Î»£¶Ô»úÆ÷ѧϰ¡¢ÄæÏò¹¤³Ì¡¢Èí¼þ¹¤³Ì¸ÐÐËȤµÄͬѧ¿ÉÒÔ¿¼ÂÇ ÒÑÓÐ3È˲ÎÓë
|
|
PhD: Mining Internet Payment Development Logs for Reliability & Security ÍøÖ·µãÕâÀhttps://vacature.beta.tudelft.nl ... ink/588360/?lang=en ×öµÄÊÂÇéÒ»¾ä»°¸ÅÀ¨¾ÍÊÇ£º´ÓÍøÂçÖ§¸¶ÏµÍ³µÄÈÕÖ¾Êý¾ÝÖÐ×Ô¶¯»¯µØÑ§Ï°µÃµ½Í¼Ä£ÐÍ£¨ÓÐÏÞ״̬»ú£©£¬ÓÃÓÚÕâ¸öϵͳ¿É¿¿ÐÔ¡¢°²È«ÐԵķÖÎö¡£ºÏ×÷µ¼Ê¦£ºProf. Arie van Deursen£¨h-index50£©£¬Dr. Sicco VerwerÈ˺Ünice¡£¶Ô»úÆ÷ѧϰ¡¢ÄæÏò¹¤³Ì¡¢Èí¼þ¹¤³Ì¡¢ÍøÂ簲ȫ¸ÐÐËȤµÄͬѧ¿ÉÒÔ¿¼ÂÇ¡£ Job description Within the recently granted NWO MIPL project, you will work closely together with Dr. Sicco Verwer and Prof. Arie van Deursen to develop novel algorithms for learning behavioural models (state machines) in real-time from vast volumes of software log-lines and methods for analysing these models. You will improve the security of a distributed payment system by inferring probabilistic state machine models from system interactions and log data. Building on technology for inferring complex communication protocols such as SIP, TLS, and EMV, you will develop new algorithms to infer behavioural models from massive logs of Adyen's payment system (https://www.adyen.com). Half of your time will be spent at Adyen in Amsterdam, working closely together with their developers and analysts in order to find anomalies and potential security issues. Your research will be used by software engineering experts to radically innovate the way log-lines are written and used. Together, you will think of new possibilities and evaluate their impact on log-line usability. You will join a team of experts in state machine learning technology, with applications ranging from reversing communication protocols to detecting malware. Requirements We invite applicants who meet the following requirements: • You have an MSc degree in computer science, artificial intelligence, or mathematics. • You have excellent programming skills and a keen interest in cyber security or machine learning, preferably both. • You have a good understanding of spoken and written English. • Published work in software engineering, intrusion detection, reverse-engineering, machine learning, or data (stream) mining is a plus. |
» ²ÂÄãϲ»¶
΢Äɼӹ¤É豸
ÒѾÓÐ0È˻ظ´
ÉϺ£½»Í¨´óѧ¼¯³Éµç·ѧԺÄÉÃ×µç×Ӻ͹âµçÆ÷¼þÑо¿×éÕÐÊÕ²©Ê¿Éú
ÒѾÓÐ1È˻ظ´
°ëµ¼Ìå¿ÆÑ§ÓëÐÅÏ¢Æ÷¼þÂÛÎÄÈóÉ«/·ÒëÔõôÊÕ·Ñ?
ÒѾÓÐ285È˻ظ´
ÉϺ£½»Í¨´óѧ¼¯³Éµç·ѧԺÄÉÃ×µç×Ӻ͹âµçÆ÷¼þÍŶÓÕÐÆ¸½ÌʦºÍ²©Ê¿ºó
ÒѾÓÐ0È˻ظ´
ÉϺ£½»Í¨´óѧ¼¯³Éµç·ѧԺÄÉÃ×µç×Ӻ͹âµçÆ÷¼þÍŶÓÕÐÊÕ²©Ê¿Éú
ÒѾÓÐ0È˻ظ´
Ìì½òÀí¹¤´óѧ-¹ú¼Òº£ÍâÓÅÇຫ¾Ã»Û½ÌÊÚ-26Ä격ʿÕÐÉú-²ÄÁÏ¡¢»¯Ñ§µÈÁìÓò
ÒѾÓÐ0È˻ظ´
2026°ëµ¼ÌåÆ÷¼þ²©Ê¿ÉêÇë
ÒѾÓÐ0È˻ظ´
ÉϺ£½»Í¨´óѧ¼¯³Éµç·ѧԺÄÉÃ×µç×Ӻ͹âµçÆ÷¼þÍŶÓÕÐÊÕ²©Ê¿Éú
ÒѾÓÐ0È˻ظ´
ÉϺ£½»Í¨´óѧ¼¯³Éµç·ѧԺÄÉÃ×µç×Ӻ͹âµçÆ÷¼þÍŶÓÕÐÊÕ²©Ê¿Éú
ÒѾÓÐ0È˻ظ´
ÉϺ£½»Í¨´óѧ¼¯³Éµç·ѧԺÄÉÃ×µç×Ӻ͹âµçÆ÷¼þÍŶÓÕÐÆ¸½ÌʦºÍ²©Ê¿ºó
ÒѾÓÐ0È˻ظ´
wy122149
гæ (ÕýʽдÊÖ)
- Ó¦Öú: 0 (Ó×¶ùÔ°)
- ½ð±Ò: 11.8
- Ìû×Ó: 339
- ÔÚÏß: 58.5Сʱ
- ³æºÅ: 3535756
- ×¢²á: 2014-11-14
- רҵ: »úе¹¤³Ì
2Â¥2016-09-21 21:23:08
ÆßÒ¹Ö®Áé
½ð³æ (ÕýʽдÊÖ)
- Ó¦Öú: 2 (Ó×¶ùÔ°)
- ½ð±Ò: 2246.1
- É¢½ð: 1740
- ºì»¨: 19
- Ìû×Ó: 596
- ÔÚÏß: 87.6Сʱ
- ³æºÅ: 1386049
- ×¢²á: 2011-09-01
- רҵ: ¼ÆËã»úÈí¼þ
3Â¥2016-09-23 10:43:11
djiayong5
гæ (ÕýʽдÊÖ)
- Ó¦Öú: 4 (Ó×¶ùÔ°)
- ½ð±Ò: 1562
- ºì»¨: 1
- Ìû×Ó: 378
- ÔÚÏß: 126.7Сʱ
- ³æºÅ: 2512865
- ×¢²á: 2013-06-18
- רҵ: È˹¤ÖÇÄÜÓë֪ʶ¹¤³Ì
4Â¥2016-10-09 10:54:52













»Ø¸´´ËÂ¥
5