Accepting PhD Students

PhD projects

<a href="https://supervisorconnect.it.monash.edu/" onclick="target='_blank';">https://supervisorconnect.it.monash.edu/</a>

19982023

Research activity per year

Personal profile

Biography

Professor Carsten Rudolph is Deputy Dean at the Faculty of Information Technology and Director for Research at the Oceania Cyber Security Centre OCSC in Melbourne, Australia. 

His research concentrates on information security, formal methods, cryptographic protocols, security of machine learning and human aspects of security with a strong focus inter-disciplinary topics. He contributes to the development of secure solutions for different areas, such as digital health or future energy networks. Further, he drives scientific exchange between cybersecurity, law and organisational informatics. Another focus of his research is on nation-level cybersecurity maturity and policy development. Dr. Rudolph has established the OCSC and leads cybersecurity maturity reviews for nations in the Pacific region, a collaboration with Oxford University. 

Monash teaching commitment

Associate Professor Carsten Rudolph has experience as the Chief Examiner/Lecturer for the following units in the Faculty of IT:

  • FIT1047 Introduction to computer systems, networks and security
  • FIT3173 Software Security
  • FIT3168 IT Forensics

Expertise related to UN Sustainable Development Goals

In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):

  • SDG 3 - Good Health and Well-being
  • SDG 7 - Affordable and Clean Energy
  • SDG 16 - Peace, Justice and Strong Institutions

Education/Academic qualification

Information Security, Doctor of Philosophy, Queensland University of Technology (QUT)

Award Date: 28 Mar 2002

Computer Science, Diplom Informatik, Goethe-Universität Frankfurt am Main (Goethe University Frankfurt)

Award Date: 30 Mar 1997

Research area keywords

  • Cyber Security
  • Trusted Computing
  • Formal Methods
  • Security Protocols
  • Security Engineering
  • Digital Forensics
  • Forensic Readiness
  • Network Security
  • Security Verification