Biography
I am currently an Assistant Professor of Computer Science (cybersecurity) at VinUniversity and the Founder of VCyber Lab. I hold a PhD and completed my postdoctoral research at Deakin University, as well as a Masterβs degree from Queensland University of Technology, Australia. My research focuses on Post-Quantum Cryptography (PQC), AI-driven cybersecurity, and IoT & robotic security. I have published many papers, including seven in Q1 journals, in top-tier venues such as TDSC, and one in a B-ranked conference.
Beyond academia, I serve as an Expert Advisor for PSI Testing and Certification Joint Stock Company (PSI), contributing to cybersecurity compliance, risk assessment, and secure system integration for telecommunications, industrial electronics, and lithium battery testing. I have also secured a research grant, won an international prize, and worked extensively with industry partners.
Throughout my career, I have mentored students in publishing high-impact research, contributed to an Elsevier book chapter, and received prestigious awards, including the School of IT Higher Degree by Research Award (2022), QUT Deanβs List recognitions (2019 & 2020), and third place in the 2022 Country to Country (C2C) Cybersecurity Challenge hosted by MIT.
I hold professional certifications in cybersecurity (Certified Ethical Hacker), machine learning (IBM Machine Learning), IoT, quantum computing, cryptography, and blockchain. My expertise lies in cybersecurity, AI technology, network security, and quantum technology, with a strong focus on machine learning and data science.
One-page CV - Research Statement - Teaching Statement - ReferencesEducation
- Doctor of Philosophy (Cybersecurity) Certificate
Deakin University, Burwood campus, Melbourne, Australia (2020-2024)
Thesis: Developing An Authentication Framework for Next Generation Network.
Award: School of Information Technology 2022 Student Excellence Award Higher Degree Research. - Master of Information Technology (Networks) Certificate
Queensland University of Technology, Brisbane, Australia (2018-2020)
Graduation with Distinction (GPA 6.118, equivalent to 81% WAM).
Award: Awarded Deanβs List for excellent academic performance in semester 2 in 2019 and semester 1 in 2020. - Bachelor Degree of Telecommunication and Electronic Certificate
Post and Telecommunications Institute of Technology, Ho Chi Minh City, Viet Nam (2006-2011)
Professional Certifications
- Cybersecurity: Certified Ethical Hacking (v12) Certificate | Network Security Certificate | Cyber Attack Countermeasures Certificate | Pentesting Fundamentals for Beginners Certificate
- Data Science: IBM Data Science Professional Certificate Certificate | IBM Machine Learning Professional Certificate Certificate | Generative AI Foundations Certificate | Generative AI with Large Language Models Certificate
- Internet of Things (IoT): IoT Devices Certificate | IoT Communications Certificate | IoT Networking Certificate | IoT Cloud Certificate | Hands-on Internet of Things Specialization Certificate
- Cryptography: Cryptography and Information Theory Certificate
- Networks: Computer Networking Certificate | Introduction to Network Automation Certificate
- Platform: Fundamentals of Cloud Computing Certificate | Operating System Foundations Certificate | Kali Linux Certificate
- Software Development: Object-Oriented Programming Concepts Certificate | Application Programming Fundamentals Certificate
- Quantum Computing: Quantum Computing For Everyone - An Introduction Certificate | Python Programming for Quantum Computing Certificate
- Blockchain: Blockchain and Cryptography Overview Certificate | Blockchain Business Model Certificate
Technical skills
- Teaching: University Teaching Certificate | English for Teaching Purposes Certificate | Foundations of Teaching for Learning: Developing Relationships Certificate
- Grant: Scientific Writing for Research Grant Proposals Certificate | Grant Proposal Plans, Sections, and Resubmission Certificate
- Research: Research Methodologies Certificate | Researcher Management and Leadership Training Certificate
Soft skills
Awards
-
Third Place - Country to Country CTF (C2C) Cybersecurity Challenge 2022 (MIT) Result - About
http://c2c-ctf-2022.mit.edu/country-country-award-winners-2022The Country to Country CTF (C2C) Cybersecurity Challenge is a series of international CTF competitions organized by the International Cyber Security β Center of Excellence (INCS-CoE) with leading international universities. The 2022 competition is hosted by the Massachusetts Institute of Technology (MIT).
-
School of Information Technology 2022 Student Excellence Award Higher Degree By Research (Deakin University) Certificate
Awarded as the student enrolled in the School of Information Technology Higher Degree by Research course who has demonstrated the highest research and academic merit.
-
Dean's List of Students with Excellent Academic Performance (2019, 2020) (QUT) Certificate
Awarded a place on the Deanβs List for Excellent Academic Performance in Semester 2, 2019, and Semester 1, 2020 at Queensland University of Technology (QUT).
Areas of Interest
- Machine Learning and AI applications in cybersecurity
- IoT Intrusion Detection
- Cryptography
- Next Generation Network Security
- Post-Quantum Cryptography (PQC)
- VPN technologies
Teaching Experience
- Cyber Security (2025) β VinUniversity
This course covers the topics of technical and social understanding of how and why security and privacy matter, how to think adversarial, how (and how not) to design systems and products. Topics include user authentication, cryptography, malware, behavioural economics in security, human factors in security, privacy and anonymity, side channels, decoys and deception, and adversarial modelling. Real-world systems and attacks, including Bitcoin, Stuxnet, retailer breaches, implantable medical devices, and health apps are covered. The course discusses societal and ethical issues in cybersecurity.
Technical skills: User authentication, cryptography, malware analysis, behavioral economics in security, human factors, privacy, side channels, decoys, adversarial modeling, real-world attack analysis, and cybersecurity ethics. - Cryptography (2025) β VinUniversity
This is an introductory course in Cryptography. Topics include one-way functions, encryption, digital signatures, pseudo-random number generation, zero-knowledge and basic protocols. The emphasis will be on fundamental notions and constructions with proofs of security based on precise definitions and assumptions.
Technical skills: One-way functions, encryption, digital signatures, pseudo-random generation, zero-knowledge, basic protocols, security proofs, and foundational cryptographic concepts. - Cyber Security Management (2023) β Deakin University
Satisfaction: 100% - Comments from students
This unit provides students with the foundations required to learn the fundamentals of cyber security management for organisations. Students will be introduced to cyber security assessment; including policy development and risk management through application of methodological and procedural techniques, for a range of organisational constraints. Students will examine both business and security operations. The unit also enables students to develop contingency planning, risk assessment, risk management and compliance standards for various businesses. Students will also explore legal and ethical issues in the context of security management and audit and will be taught security education, training and awareness (SETA), incident response and auditing for cyber security management.
- Cyber Security Analytics (2022-2023) β Deakin University
Satisfaction: 100% - Comments from students - More comments
Tutor for the subject: In the unit students will learn about the various data analytical methodologies used to investigate cyber security problems. In particular, we will focus on processing and analysing data relevant to cyber security systems and applications. Students will be introduced to the scripting techniques and solutions required for data analytics in the context of cyber security. Applying appropriate data analytical methods and solving cyber security problems will be a key practical element of this unit.
Technical skills: Security Β· Machine Learning Β· Python (Programming Language) Β· Artificial Intelligence (AI) - Advance Network Security (2022) β Deakin University
Satisfaction: 92.9% - Comments from students
Tutor for the subject: A strong understanding of networking is critical for cyber security. This unit will provide students in the network security minor the advanced understanding of networks needed for success in the field. The unit will cover a range of advanced and emerging technologies, such as Software Defined Networks, Internet of Things, and AI based networking.
Technical skills: 5G Β· Network Security Β· Internet of Things (IoT) Β· Machine Learning Β· Python (Programming Language) Β· Physical Security
Professional Experience
-
Assistant Professor (12/2024 β Present) β VinUniversity, Ha Noi, Viet Nam
Duties:- Teaching: Develop and implement high-quality, accredited curricula for courses in cryptography, cybersecurity, and networks. Teach assigned courses with an emphasis on active learning pedagogy, supervise both undergraduate and graduate students, and ensure effective, high-standard instructional materials, aiming for high evaluation scores.
- Research and Creative Works:: Conduct research and produce high-quality publications, particularly in cybersecurity and network security, secure external funding, and actively engage in interdisciplinary and professional communities. Set goals for publishing Q1 articles or equivalent annually and secure externally funded projects.
- Service: Provide academic advising and support to students, contribute to college-wide initiatives, participate in administrative and faculty recruitment tasks, and serve on committees to advance institutional goals and enhance student success.
Technical skills: Cybersecurity tools (IDS, IPS, SIEM), cryptography (AES, RSA, SHA), network security (SSL/TLS, IPsec), penetration testing (Metasploit, Nessus, Burp Suite), programming (Python, C/C++, Bash, PowerShell), machine learning in cybersecurity, blockchain, quantum computing, data analysis (Pandas, Matplotlib, Power BI), and risk assessment (NIST, ISO 27001). -
Associate Research Fellow (06/2023 β 11/2024) β Deakin University, Melbourne, Australia
Projects:- SOCRATES project (Software Security with a focus on critical technologies) (PQC & VPN): We designed and implemented an automatic hybrid Post-Quantum Cryptography system that mitigates threats from both traditional cryptographic and quantum attacks. We also deployed this system on cloud servers and conducted various evaluations under different network conditions.
- Publications: submitted to the IEEE TIFS (waiting outcome).
Technical skills: C programming, IKEv2 protocol, VPN technologies, PQC (Post-Quantum Cryptography), Virtual Machines (Docker,VMware, Hyper-V, Virtual Box), Scripting languages (Bash, PowerShell...). -
Research Assistant & Casual Teaching (02/2022 β 6/2023) β Deakin University, Melbourne, Australia
Projects:- Accurate Decision-making for Network Security with Compromised Data. (Department of Defence) - submitted to the IEEE TMC (major revision).
- Impersonation Attack Detection in IoT Networks. - published in IEEE Globecome.
- Towards a Novel Intrusion Detection System in Next Generation Cloud Native Networks. - published in IEEE IoTJ.
- A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication. - published in IEEE IoT Magazine.
- Security Challenges and Potential Solutions in Aerial-terrestrial Wireless Networking. - published in IEEE IoT Magazine.
- Performance Evaluation of a Simple and Effective Intrusion Detection Architecture in 5G Networks. - published in IEEE TNSM.
Teaching:- Cyber Security Management (2023) β Deakin University
Satisfaction: 100% - Comments from students
- Cyber Security Analytics (2022-2023) β Deakin University
Satisfaction: 100% - Comments from students - More comments
- Advanced Network Security (2022) β Deakin University
Satisfaction: 92.9% - Comments from students
Technical skills: Python programming, MatLab, OSM MANO (5G Platform), Machine learning models (supervised, unsupervised, deep learning...), Cloud Technology (AWS, Google Cloud, OpenStack...). -
Senior Test Engineer (14/08/2017 - 09/02/2018) β Tech JDI, Ho Chi Minh City, Viet Nam
Duties:- Design test plans, test cases, test scripts, and supporting data, working to the specifications provided.
- Analyse and report test activities and results.
- Provided technical expertise for security, platform, service, and infrastructure.
- Delivered V-Key Platform for customer/end-user.
- Spearheaded migration of EJBCA on Web Logic 12c, resulting in savings of 98K β¬ for Product Engineering department.
Technical skills: Java, Python programming, Scripting languages (Bash, PowerShell...), Automation Tools (Selenium, JUnit/TestNG,Jenkins, Postman, Bumpsuite...), Cloud Technology (AWS, Google Cloud, OpenStack...), Virtual Machines (Docker,VMware, Hyper-V, Virtual Box). -
Test Analyst & Networking Specialist (21/03/2013 - 03/07/2017) β TMA Solution, Ho Chi Minh City, Viet Nam
Duties:- Design and execute test scenarios, test cases, test conditions, and automated test scripts.
- Extensive experience in designing and implementing scalable and robust automation frameworks.
- Addressed all issues, risks, and dependencies for multiple projects on tight deadlines as key contact for escalation of project deliverables.
- Set up and configure the network topology for lab.
- Excellent CC network support - 2016
- Joined Fast Track training program in 6 months β For top 5% people - 2015
- PA 5 β the highest performance appraisal, promoted 2 levels - 2014
- Young CC supporter - 2013
Technical skills: Python programming, Scripting languages (Bash, PowerShell...), Automation Tools (Selenium, JUnit/TestNG,Jenkins, Postman, Bumpsuite...), Cloud Technology (AWS, Google Cloud, OpenStack...), Virtual Machines (Docker,VMware, Hyper-V, Virtual Box), Network Protocols, Network devices (switches, routers). -
Networking Specialist (17/10/2011 - 21/01/2013) β Vietnam Posts & Telecommunications Group (VNPT), Viet Nam
Duties:- Set up and configure the network topology for Vietnam network backbone.
- Troubleshoot network issues and other problems 24/24.
- Plan, design, and manage all LAN/WAN projects.
Technical skills: Python programming, Scripting languages (Bash, PowerShell...), Virtual Machines (Docker,VMware, Hyper-V, Virtual Box), Network Protocols, Network devices (switches, routers).
Publications
Visit my Google Scholar Profile and IEEE Profile for a complete list of publications. To date, I have published 11 journal papers (7 Q1) in IEEE venues and one IEEE conference (rank B).
- K. Sood, S. Liu, D. D. N. Nguyen, N. Kumar, B. Feng and S. Yu, "Alleviating Data Sparsity to Enhance AI Models Robustness in IoT Network Security Context," in IEEE Transactions on Mobile Computing, doi: 10.1109/TMC.2025.3525463. Download PDF
- Syed W Shah Pan, D. D. N. Nguyen, Robin Doss, Warren Armstrong, Praveen Gauravaram, "Double-Signed Fragmented DNSSEC for Countering Quantum Threat," in arXiv preprint arXiv:2411.07535 Download PDF
- D. D. N. Nguyen et al., "Design and Robust Evaluation of Next Generation Node Authentication Approach," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2024.3373778. (Q1, Impact Factor: 6.407) Download PDF
- G. Singh, K. Sood, P. Rajalakshmi, D. D. N. Nguyen and Y. Xiang, "Evaluating Federated Learning-Based Intrusion Detection Scheme for Next Generation Networks," in IEEE Transactions on Network and Service Management, vol. 21, no. 4, pp. 4816-4829, Aug. 2024, doi: 10.1109/TNSM.2024.3385385. (Q1, Impact Factor: 5.853) Download PDF
- K. Sood, D. D. N. Nguyen, Y. Qu, L. Cui, K. K. Karmakar and S. Yu, "Security Challenges and Potential Solutions in Aerial-Terrestrial Wireless Networking," in IEEE Internet of Things Magazine, vol. 6, no. 4, pp. 118-123, December 2023, doi: 10.1109/IOTM.001.2300024. Download PDF
- D. D. N. Nguyen, K. Sood, Y. Xiang, L. Gao, L. Chi and S. Yu, "Toward IoT Node Authentication Mechanism in Next Generation Networks," in IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13333-13341, 1 Aug. 1, 2023, doi: 10.1109/JIOT.2023.3262822. (Q1, Impact Factor: 9.936, FWCI: 2.34) Download PDF
- Sood, K., D. D. N. Nguyen, Nosouhi, M. R., Kumar, N., Jiang, F., Chowdhury, M., & Doss, R. "Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks," in IEEE Transactions on Network and Service Management, vol. 20, no. 3, pp. 3831-3847, Sept. 2023, doi: 10.1109/TNSM.2023.3242270. (Q1, Impact Factor: 5.853, FWCI: 0.28) Download PDF
- K. Sood, M. R. Nosouhi, D. D. N. Nguyen, F. Jiang, M. Chowdhury and R. Doss, "Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 965-979, 2023, doi: 10.1109/TIFS.2022.3233777. (Q1, Impact Factor: 7.178, FWCI: 7.53) Download PDF
- D. D. N. Nguyen, K. Sood, Y. Xiang, L. Gao and L. Chi, "Impersonation Attack Detection in IoT Networks," GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 6061-6066, doi: 10.1109/GLOBECOM48099.2022.10001392. (FWCI: 2.03) Download PDF
- D. D. N. Nguyen, K. Sood, M. R. Nosouhi, Y. Xiang, L. Gao and L. Chi, "RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory," in IEEE Networking Letters, vol. 4, no. 2, pp. 78-81, June 2022, doi: 10.1109/LNET.2022.3167665. Download PDF
- K. Sood, S. Yu, D. D. N. Nguyen, Y. Xiang, B. Feng and X. Zhang, "A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication," in IEEE Internet of Things Magazine, vol. 4, no. 4, pp. 120-126, December 2021, doi: 10.1109/IOTM.001.2100115. (FWCI: 0.57) Download PDF
As a regular reviewer for esteemed journals such as IEEE Transactions on Dependable and Secure Computing (Q1, top venue for cybersecurity), IEEE Networking Letters (Q1), IEEE Internet of Things Journal (Q1), IET Networks (Q3), EAI TRIDENTCOM 2021 - 16th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies (Program Committee Member has evaluated my Review with a rating of 4), I am actively engaged in evaluating cutting-edge research across network technologies and IoT security. My involvement allows me to stay at the forefront of advancements in these fields, while contributing to the academic community through critical assessments of high-impact studies.
Mentorship
Mentoring and supervising higher-degree research students has been one of the most fulfilling parts of my academic career. My ability to inspire and lead students has led to successful research outcomes and has significantly contributed to our growth as scholars. Currently, I am actively mentoring students at VCyber Lab under my supervision.
- At VCyber Lab, I have mentored two master's graduates, two current master's students, and four bachelor's students, guiding them through research projects in Post-Quantum Cryptography (PQC), AI-driven cybersecurity, and IoT & robotic security. My mentorship focuses on refining research questions, navigating academic challenges, and developing technical expertise, resulting in collaborative research outputs.
- At Deakin University, during the third year of my studies, I had the privilege of guiding a new student (Mr. Gurpreet Singh) under the supervision of Dr. Keshav Sood. Through weekly meetings, I contributed to developing and refining his research questions, helped him navigate the complexities of the academic research journey, and provided mentorship while sharing my own research experiences. I am pleased to mention that the supportive environment we created resulted in a joint publication (link), demonstrating my ability to supervise HDR candidates.
- During my postdoc, I had the opportunity to guide a master's student, Mr. Michael, supervised by Dr. Sood. I supported him in writing and revising a book chapter, which has been preliminarily accepted and will be published by Elsevier (Scopus).
Research collaboration
These experiences have given me insight into the process of securing research funding, and working on critical technologies has positioned me well to pursue future funding opportunities. My colleagues and I submitted an internal grant application focused on mitigating software supply chain security issues and received a successful outcome. I am closely working with Dr. Keshav Sood on submitting an external grant application (as co-lead) to the Department of Defence, which is an extension of Dr. Soodβs previous project.
References
- Dr. Keshav Sood - Senior Lecturer, Deakin University.
Phone: +61 3 924 45519
Email: keshav.sood@deakin.edu.au - Professor Yong Xiang - Professor of Network Engineering, Deakin University.
Phone: +61 3 925 17740
Email: yong.xiang@deakin.edu.au - Associate Professor Lei Pan - Associate Professor, Deakin University.
Phone: +61 3 925 17483
Email: l.pan@deakin.edu.au