Personal profile

Biography

Dr Phu Le works in the Faculty of Information Technology at Monash University as a Lecturer.

Monash teaching commitment

Dr Phu Le has experience as the Chief Examiner for the following units in the Faculty of IT:

  • FIT3056 Secure and trusted software systems
  • FIT5010 Network protocols standards
  • FIT5034 Quality of service and network management
  • FIT5037 Network security
  • FIT5044 Network security
  • FIT5083 Wireless networks
  • FIT5129 Enterprise IT security - planning, operations and management

Le has experience as the Lecturer for the following units in the Faculty of IT:

  • FIT5037 Network security
  • FIT5044 Network security
  • FIT5083 Wireless networks
  • FIT5129 Enterprise IT security - planning, operations and management
  • FIT9134 Computer architecture and operating systems

Keywords

  • Computer Systems Security
  • Data Encryption
  • Denial of Service
  • Filtering
  • Flexible Authentication Technique
  • Packet Filtering
  • Passport (Identification Token)
  • Token Filter Technique (TFT)
  • Ubiquitous Wireless Communication
  • Visa (Authorisation Token)

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1997 2016

A dynamic security model for addressing hacking risk factors

Alsunbul, S. A., Le, P. D., Newmarch, J. & Tan, J. 2016 Proceedings of the 25th International Conference on Information Systems Development, ISD 2016: August 24-26, 2016, Katowice, Poland. Gołuchowski, J. & Pańkowska, M. (eds.). Association for Information Systems, p. 586-594 9 p.

Research output: Research - peer-reviewConference Paper

A network defense system for detecting and preventing potential hacking attempts

Alsunbul, S., Le, P., Tan, J. & Srinivasan, B. 7 Mar 2016 2016 International Conference on Information Networking (ICOIN 2016): 13-15 January 2016, Kota Kinabalu, Malaysia [proceedings]. Lee, H. (ed.). Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 449-454 6 p. 7427157

Research output: Research - peer-reviewConference Paper

A hybrid mobile authentication model for ubiquitous networking

Almuhaideb, A., Srinivasan, B., Le, P. D., Alhabeeb, M. & Alfehaid, W. M. 2015 2015 IEEE Trustcom/BigDataSE/ISPA. Yan, Z. & Mueller, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1, p. 360 - 367 8 p.

Research output: Research - peer-reviewConference Paper

An active defence system for securing network infrastructures against hacking

Alsunbul, S., Le, P. D., Tan, J. & Srinivasan, B. 2015 Proceedings of The 26th International Business Information Management Association Conference (IBIMA). Soliman, K. S. (ed.). Norristown PA USA: International Business Information Management Association, p. 634 - 647 14 p.

Research output: Research - peer-reviewConference Paper

An evolving trust paradigm for enforcing computing system security

Creado, O. M., Le, P. D., Newmarch, J. & Tan, J. 2015 2015 IEEE Congress on Evolutionary Computation (CEC 2015). Murata, T. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2595 - 2602 8 p.

Research output: Research - peer-reviewConference Paper