Call for application 39th cycle

Bando ordinario (expired 22/06/2023)


Educational goals and objectives

CYBERSECURITY
Cybersecurity is an interdisciplinary field of study that has established itself in recent years as an evolution of the more traditional information security field. Classic problems in information security (such as software security, systems security, network security, cryptography, etc.) have been joined by other aspects that aim to grasp the complexity of modern threats and security concerns emerging in digital transformation processes: security of cyber-physical infrastructures, data governance, business resilience and human rights. For these reasons, cybersecurity today represents a research area with important multidisciplinary aspects, ranging from purely technological IT issues to aspects related to the control of data and information flows in complex socio-technical systems operating in a variety of settings such as healthcare, e-government, digital business, finance, logistics and energy. Cybersecurity also provides a promising field for advancing theories in many disciplines such as computer science, information systems, management, innovation, regulation and strategy. In fact, through critical reflections on emerging phenomena related to cybersecurity, scholars can challenge accepted views and underlying ideological and onto-epistemic assumptions to generate new theoretical insights from the empirical evidences.

The PhD in cybersecurity aims to train:
1) researchers capable of operating both in academia and in public and private research institutions for the development of new technologies and methodologies for cybersecurity;
2) specialists of the highest professional level with engineering and managerial skills capable of introducing technological and methodological innovation within the main application sectors of cybersecurity.

The multidisciplinary nature of this field of study is well represented by the composition of the doctoral college which leverages expert professors from multiple scientific sectors.

The research areas of main interest for the doctorate are:
- Systems security
- Software security
- Hardware security
- Network security
- Cryptography
- Cyber ​​risk management
- Data privacy and security
- Security governance
- Security in supply chains
- Security operations
- Economics of cybersecurity
- High-reliable organizing
- Information warfare

These issues are also addressed in their application to specific sectors such as the financial one, TLC, critical infrastructures, cloud services, e-government, health, manufacturing.

Specifiche economiche

Tipologia 1: DM118
Transizione digitale Generiche Pubblica Amministrazione Patrimonio culturale
0 2 1 0

Tipologia 2: DM117 Tipologia 3: PE/PNC/CN/TP Tipologia 4:Enti terzi
PE/PNC CN/TP
0 4 0 0

Tipologia 5: Sapienza Senza borsa
2 3

Tematiche, curriculum e competenze specifiche
Themes, curriculum and specific competence

C_PA - DM118 P.A. - non associata a curriculum

- Securing the digital transformation of public administration processes
Ente finanziatore: PNRR
Competenze richieste: nessuna competenza specifica richiesta
- Mettere in sicurezza la trasformazione digitale dei processi della pubblica amministrazione
Founded by: PNRR
Required skills: no specific skill required

C_PNRR - DM118 GENERICHE - non associata a curriculum

- AI and algorithmic approaches for privacy protection and attack prevention
Ente finanziatore: LUISS
Competenze richieste: nessuna competenza specifica richiesta
- AI and algorithmic approaches for privacy protection and attack prevention
Founded by: LUISS
Required skills: no specific skill required

PE - PARTENARIATI ESTESI - non associata a curriculum

- Unraveling the Interplay between Feed Algorithms, Polarization Online, and the Impact of Coordinated Inauthentic Behavior on Social Dynamics
Ente finanziatore: PNRR
Competenze richieste: Requirements for the position: 1. A strong background in computer science, data science, or a related field, with experience in social network analysis, machine learning, and natural language processing. 2. A solid understanding of online social dynamics, including the role of social media platforms and online communities in shaping public opinion and discourse. 3. Familiarity with the ethical and legal implications of researching and addressing CIB, including data privacy concerns and potential unintended consequences. 4. Excellent written and oral communication skills, with the ability to present research findings to academic and non-academic audiences. 5. A strong commitment to interdisciplinary research, as the project will likely involve collaboration with experts from fields such as psychology, sociology, political science, and communications.
- Unraveling the Interplay between Feed Algorithms, Polarization Online, and the Impact of Coordinated Inauthentic Behavior on Social Dynamics
Founded by: PNRR
Required skills: Requirements for the position: 1. A strong background in computer science, data science, or a related field, with experience in social network analysis, machine learning, and natural language processing. 2. A solid understanding of online social dynamics, including the role of social media platforms and online communities in shaping public opinion and discourse. 3. Familiarity with the ethical and legal implications of researching and addressing CIB, including data privacy concerns and potential unintended consequences. 4. Excellent written and oral communication skills, with the ability to present research findings to academic and non-academic audiences. 5. A strong commitment to interdisciplinary research, as the project will likely involve collaboration with experts from fields such as psychology, sociology, political science, and communications.

PE - PARTENARIATI ESTESI - non associata a curriculum

- Strategie di Difesa contro Attacchi Antagonisti in Sistemi di Apprendimento Distribuito
Ente finanziatore: PNRR
Competenze richieste: Fondamenti teorici e metodologici di machine learning; Elevata capacità di programmazione in Python con particolare padronanza dell'uso di librerie sia per lo sviluppo di modelli "classici" (ad es., scikit-learn) che basati su reti neurali (ad es., PyTorch, TensorFlow); Conoscenza di framework per la simulazione di ambienti di federated learning (ad es., Flower).
- Defense Strategies against Adversarial Attacks in Distributed Learning Systems
Founded by: PNRR
Required skills: Theoretical and methodological foundations of machine learning; Strong Python programming capabilities, in particular for the development of "classical" ML models (e.g., scikit-learn) and deep learning neural networks (e.g., PyTorch, TensorFlow); Knowledge of existing FL simulation frameworks (e.g., Flower) will be beneficial.

PE - PARTENARIATI ESTESI - non associata a curriculum

- Disinformation detection and media forensics
Ente finanziatore: PNRR
Competenze richieste: nessuna competenza specifica richiesta
- Disinformation detection and media forensics
Founded by: PNRR
Required skills: no specific skill required

PE - PARTENARIATI ESTESI - non associata a curriculum

- Security and confidentiality in decentralised systems
Ente finanziatore: PNRR
Competenze richieste: The candidates are expected to have expertise in the broad area of computer science, and preferably with knowledge in some of the following topics: Communication protocols, Blockchain technologies, Information-Centric Networking, Internet of Things, Secure Authentication, and Privacy-Preserving Protocols.
- Security and confidentiality in decentralised systems
Founded by: PNRR
Required skills: The candidates are expected to have expertise in the broad area of computer science, and preferably with knowledge in some of the following topics: Communication protocols, Blockchain technologies, Information-Centric Networking, Internet of Things, Secure Authentication, and Privacy-Preserving Protocols.

Il candidato sceglierà una tematica in fase di presentazione della candidatura on line


Admission Procedure

Qualifications assessment The admission committee assigns to each candidate a maximum score of 60 points. Scores are assigned according to the following evaluation criteria:
- up to 30 points for the evaluation of the curriculum (including the academic career and any other qualifications), the letters of recommendations supporting the candidate (mx 2 letters) and the publications presented by the candidate;
- up to 30 points for the research proposal submitted by the candidate. In particular, the commission evaluates the description of the state of the art, the originality and the innovative nature of the proposal, the clarity and completeness of the objectives, the methodologies and the potential results, the relevance of the proposal with respect to the topics and objectives of the Ph.D. program. Candidates obtaining a minimum score of 36/60 in the evaluation of qualifications and of the research proposal are admitted to the oral interview.

Oral interview The admission committee assigns a maximum of 60 points to each candidate admitted to the interview. The interview is in English, and is aimed at assessing the candidates' knowledge, skills, and aptitude to carry out research in the scientific areas of Cybersecurity. The interview also includes a discussion of the research proposal prepared by the candidate and of personal motivations for applying for a Ph. D. position. The duration of the interview is at most 30 minutes (the presentation of the research proposal by the candidate must be no longer than 15 minutes; slides are allowed). The minimum overall score for admission to the Ph.D. in Cybersecurity is 72/120.
language INGLESE


contacts and info dottoratocyber@diag.uniroma1.it

Curriculum studiorum

Graduation date and grade of the Master's degree
detailed list of exams including completion dates and scores of Masters's degree
History of Scholarships, Research Grants (or similar)
Certificates of Foreign Languages
Certificates of participation in post-graduate university courses
Other University Awards/Degrees (e.g.: awards in competition, second degree)

Required documentation

§ research project
mandatory
The research proposal must be written in English in accordance with the following template:

Applicant's first name ......... last name ............... Proposal title: ............

Area (select at most two areas of interest from the following list)
[ ] System security
[ ] Software security
[ ] Hardware security
[ ] Network security
[ ] Cryptography
[ ] Cyber risk management
[ ] Data security and privacy
[ ] Security governance
[ ] Supply chain security
[ ] Security operations
[ ] Cybersecurity economy
[ ] Highly-reliable organisations
[ ] Disinformation
[ ] Other (specify): .....

***Summary of proposal***
(maximum 1000 characters, including spaces)
Brief summary of the research project, highlighting problem statement, motivations, objectives, original content.

***State of the art of the research field***
(maximum 2.000 characters, including spaces)

***Research objectives, content, and methodology***
(maximum 8.000 characters, including spaces)
Detailed description of the research project, emphasising original and innovative aspects and scientific relevance.

***Results, impact, and benefits***
(maximum 8.000 characters, including spaces)
Detailed description of the expected results, advancements, impacts and benefits.
, the file must be uploaded within 22/06/2023 ore 14:00 (ora italiana)

§ first letter of introduction (by a teacher)
optional, the letter must be uploaded by the candidate, the file must be uploaded within 22/06/2023 ore 14:00 (ora italiana)

§ second letter of introduction (by a teacher)
optional, the letter must be uploaded by the candidate, the file must be uploaded within 22/06/2023 ore 14:00 (ora italiana)

§ List of publications
optional, the file must be uploaded within 22/06/2023 ore 14:00 (ora italiana)

§ degree thesis (complete)
optional, the file must be uploaded within 22/06/2023 ore 14:00 (ora italiana)

§ Curriculum Vitae et Studiorum
mandatory, the file must be uploaded within 22/06/2023 ore 14:00 (ora italiana)

Language Skills

the candidate must know the following languages
ENGLISH

Exam Schedule

Qualifications assessment
day30/06/2023
notesnone
publication on notice boardNO
publication on the web siteYes
web sitehttps://phd.uniroma1.it/web/CYBERSECURITY_nD3859.aspx
date of publication14/07/2023
contactsdottoratocyber@diag.uniroma1.it

Oral interview
day17/07/2023
notesnone
time09:00
classroomroom B101
addressDIAG, Via Ariosto 25, Roma, ITALY
publication on notice boardNO
publication on the web siteYes
web sitehttps://phd.uniroma1.it/web/CYBERSECURITY_nD3859.aspx
date of publication21/07/2023
contactsdottoratocyber@diag.uniroma1.it

Evaluation scale

file:visualizza il file
file (eng):visualizza il file (eng)

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma