If you made any changes in Pure these will be visible here soon.

Personal profile

Biography

Dr Phu Le works in the Faculty of Information Technology at Monash University as a Lecturer.

Monash teaching commitment

Dr Phu Le has experience as the Chief Examiner for the following units in the Faculty of IT:

  • FIT3056 Secure and trusted software systems
  • FIT5010 Network protocols standards
  • FIT5034 Quality of service and network management
  • FIT5037 Network security
  • FIT5044 Network security
  • FIT5083 Wireless networks
  • FIT5129 Enterprise IT security - planning, operations and management

Le has experience as the Lecturer for the following units in the Faculty of IT:

  • FIT5037 Network security
  • FIT5044 Network security
  • FIT5083 Wireless networks
  • FIT5129 Enterprise IT security - planning, operations and management
  • FIT9134 Computer architecture and operating systems

Keywords

  • Computer Systems Security
  • Data Encryption
  • Denial of Service
  • Filtering
  • Flexible Authentication Technique
  • Packet Filtering
  • Passport (Identification Token)
  • Token Filter Technique (TFT)
  • Ubiquitous Wireless Communication
  • Visa (Authorisation Token)

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1997 2017

A formal model for an ideal CFI

Minagar, S., Srinivasan, B. & Le, P. D., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 707-726 20 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enforcing security in artificially intelligent robots using monitors (short paper)

Creado, O. M. & Le, P. D., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 648-659 12 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Securing smart cities with monitors

Creado, O. M. & Le, P. D., 1 Jan 2017, Proceedings of the 30th International Business Information Management Association Conference (IBIMA): 8-9 November 2017 Madrid Spain. Soliman, K. S. (ed.). King of Prussia PA USA: International Business Information Management Association (IBIMA), p. 3972-3991 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A dynamic security model for addressing hacking risk factors

Alsunbul, S. A., Le, P. D., Newmarch, J. & Tan, J., 2016, Proceedings of the 25th International Conference on Information Systems Development, ISD 2016: August 24-26, 2016, Katowice, Poland. Gołuchowski, J. & Pańkowska, M. (eds.). Association for Information Systems, p. 586-594 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A network defense system for detecting and preventing potential hacking attempts

Alsunbul, S., Le, P., Tan, J. & Srinivasan, B., 7 Mar 2016, 2016 International Conference on Information Networking (ICOIN 2016): 13-15 January 2016, Kota Kinabalu, Malaysia [proceedings]. Lee, H. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 449-454 6 p. 7427157

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review