Mr Hussain Ahmad
Lecturer
Optimisation and Stabilisation
Integration Management Office
Eligible to supervise Masters and PhD (as Co-Supervisor) - email supervisor to discuss availability.
Dr Hussain Ahmad is a Lecturer and Researcher at the School of Computer Science and Information Technology, Adelaide University, Australia. His research spans Cyber Security, Software Engineering, and Generative AI, with a strong focus on industry-driven innovation and real-world applications. He leads the design and delivery of courses in Cyber Security, Big Data, and Industry Projects, where he fosters strong connections between academic learning and professional practice. He also provides technical guidance and inclusive feedback to students across undergraduate and postgraduate levels, supporting their research and development activities.
Dr Ahmad’s teaching philosophy is grounded in five core principles: clear structure, simplicity with depth, real-world relevance, constructive feedback, and positive energy. (1) Clear structure. He designs lectures and workshops with a logical flow so students can easily follow concepts and retain knowledge; (2) Simplicity with depth. He explains complex topics in a clear and practical way while maintaining academic rigour; (3) Real-world relevance. He consistently links theory to industry practice and real professional challenges; (4) Constructive feedback. He provides timely, actionable feedback that helps students track progress, strengthen understanding, and build confidence; and (5) Positive energy. He fosters a supportive, motivating classroom environment that encourages participation, engagement, and academic growth.
Dr Ahmad leads interdisciplinary research at the intersection of Cyber Security, Generative AI, Agentic AI, Data Science, and Software Engineering, with a strong focus on industry-driven innovation and real-world applications. He has published extensively in top-tier international conferences and journals, including CORE A* and A-ranked venues. He actively contributes to the global research community as a reviewer, program committee member, and editorial board member for leading journals and conferences. Dr Ahmad has secured multiple competitive research grants, driving breakthrough innovations that bridge academic excellence with real-world applications in critical infrastructure protection, AI-enabled systems, and software resilience. A full list of research publications is available on his Google Scholar profile.
Industry Collaborations. Dr Ahmad has led and contributed to multiple R&D initiatives in collaboration with government agencies, defence organisations, and high-growth startups, including the Department of State Development (South Australia), Defence Science and Technology Group (Australia), Defence Trailblazer, the Cyber Security Cooperative Research Centre, CSIRO’s Data61, Cisco, the South Australian Health and Medical Research Institute (SAHMRI), Surf Life Saving South Australia, DEWC Services, Honeywell (UK), SLB (Schlumberger, USA), and several emerging startups based at the Stone & Chalk Adelaide Startup Hub.
Academic Collaborations. He also collaborated with renowned academic institutions, including Imperial College London, the University of Melbourne, Monash University, Singapore Management University, Zayed University (UAE), National Institute of Technology (India), and State University of New York Polytechnic Institute (USA).
PhD Research. Dr Ahmad completed his PhD at the University of Adelaide, Australia, where he conducted advanced interdisciplinary research at the convergence of Cyber Security, Artificial Intelligence, and Software Engineering, resulting in 12 research publications. His doctoral thesis was accepted without corrections following rigorous examination by international experts, reflecting the quality, originality, and impact of his research contributions.
Dr Ahmad’s PhD research focused on enhancing the security of command-and-control (C2) systems critical to civil and defence domains. He developed simulation-based methods for C2 network security analysis, performed static and dynamic risk assessments, and designed an integrated risk management framework. Dr Ahmad also developed advanced techniques for software vulnerability detection, assessment, prioritisation, and management, leveraging machine learning, deep learning, and Generative AI models. In addition, he explored the use of immersive technologies, including augmented reality, virtual reality, and mixed reality, to improve cyber situational awareness and decision-making. Beyond cyber security, Dr Ahmad made significant contributions to advancing the scalability, resilience, and efficiency of cloud-native microservice architectures. He focused on optimising containerized software systems to support AI-driven, adaptive DevOps practices in modern distributed cloud environments. Leveraging AWS cloud services, Kubernetes orchestration, and dynamic resource management, he designed, developed, and evaluated a suite of self-adaptive auto-scaling frameworks, Smart HPA, ProSmart HPA, and SecureSmart HPA, that enable resource-aware, proactive, and resilient auto-scaling for high-throughput, latency-sensitive workloads.
| Date | Position | Institution name |
|---|---|---|
| 2025 - ongoing | Lecturer | University of Adelaide |
| 2021 - 2025 | PhD Researcher | University of Adelaide |
| 2020 - 2021 | Cyber Security Engineer | University of Adelaide |
| Date | Type | Title | Institution Name | Country | Amount |
|---|---|---|---|---|---|
| 2025 | Award | STEM Award | 7NEWS Young Achiever Awards South Australia | Australia | - |
| 2024 | Award | Outstanding International Student | The University of Adelaide | Australia | - |
| 2024 | Award | HDR Representative Award | The University of Adelaide | Australia | - |
| 2024 | Award | VYT People’s Choice Award | The University of Adelaide | Australia | - |
| Language | Competency |
|---|---|
| English | Can read, write, speak, understand spoken and peer review |
| Urdu | Can read, write, speak, understand spoken and peer review |
| Date | Institution name | Country | Title |
|---|---|---|---|
| 2021 - 2025 | University of Adelaide | Australia | Doctor of Philosophy (PhD) |
| 2013 - 2017 | Ghulam Ishaq Khan Institute of Engineering Sciences and Technology | Pakistan | Bachelor of Electrical and Electronics Engineering |
| Year | Citation |
|---|---|
| 2025 | Ahmad, H., Treude, C., Wagner, M., & Szabo, C. (2025). Towards resource-efficient reactive and proactive auto-scaling for microservice architectures. Journal of Systems and Software, 225, 112390. Scopus8 WoS8 |
| 2025 | Ahmad, H., Ullah, F., & Jafri, R. (2025). A Survey on Immersive Cyber Situational Awareness Systems. Journal of Cybersecurity and Privacy, 5(2), 26 pages. Scopus1 WoS1 |
| 2025 | Abdulsatar, M., Ahmad, H., Goel, D., & Ullah, F. (2025). Towards deep learning enabled cybersecurity risk assessment for microservice architectures. Cluster Computing, 28(6), 16 pages. Scopus2 |
| 2025 | Zhang, Y., Goel, D., Ahmad, H., & Szabo, C. (2025). RegimeFolio: A Regime Aware ML System for Sectoral Portfolio Optimization in Dynamic Markets. IEEE Access, 13, 184722-184744. Scopus1 WoS1 |
| 2024 | Jayalath, R. K., Ahmad, H., Goel, D., Syed, M. S., & Ullah, F. (2024). Microservice Vulnerability Analysis: A Literature Review with Empirical Insights. IEEE Access, 12, 1. Scopus10 WoS6 |
| 2023 | Ahmad, H., Dharmadasa, I., Ullah, F., & Babar, M. A. (2023). A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. ACM Computing Surveys, 55(9), 192-1-192-38. Scopus16 WoS10 |
| Year | Citation |
|---|---|
| 2025 | Abbas, F., Ahmad, H., & Szabo, C. (2025). SCALAR: Self-Calibrating Adaptive Latent Attention Representation Learning. In 2025 IEEE 37th International Conference on Tools with Artificial Intelligence (ICTAI) (pp. 762-769). IEEE. DOI |
| 2024 | Ahmad, H., Treude, C., Wagner, M., & Szabo, C. (2024). Smart HPA: A Resource-Efficient Horizontal Pod Auto-Scaler for Microservice Architectures. In Proceedings - IEEE 21st International Conference on Software Architecture, ICSA 2024 (pp. 46-57). Online: IEEE. DOI Scopus15 WoS8 |
| Year | Citation |
|---|---|
| - | Ahmad, H. (n.d.). Towards Self-Adaptive Scalability and Cybersecurity in Software Engineering. DOI |
| Year | Citation |
|---|---|
| 2025 | Ullah, F., Ye, X., Fatima, U., Akhtar, Z., Wu, Y., & Ahmad, H. (2025). What Skills Do Cyber Security Professionals Need?. |
| 2025 | Ahmad, H., Treude, C., Wagner, M., & Szabo, C. (2025). Resilient Auto-Scaling of Microservice Architectures with Efficient Resource Management. |
| 2025 | Ahmad, H., & Goel, D. (2025). The Future of AI: Exploring the Potential of Large Concept Models. |
| 2024 | Chopra, S., Ahmad, H., Goel, D., & Szabo, C. (2024). ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models. |
| 2024 | Ahmad, H., & Goel, D. (2024). Machine Learning Driven Smishing Detection Framework for Mobile Security. DOI |
| 2024 | Ahmad, H., Treude, C., Wagner, M., & Szabo, C. (2024). Towards Resource-Efficient Reactive and Proactive Auto-Scaling for Microservice Architectures. DOI |
| 2024 | Abbas, F., & Ahmad, H. (2024). Robust Partial Least Squares Using Low Rank and Sparse Decomposition. DOI |
| 2024 | Ahmad, H., Treude, C., Wagner, M., & Szabo, C. (2024). Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures. |
| 2024 | Abdulsatar, M., Ahmad, H., Goel, D., & Ullah, F. (2024). Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures. |
| 2024 | Jayalath, R. K., Ahmad, H., Goel, D., Syed, M. S., & Ullah, F. (2024). Microservice Vulnerability Analysis: A Literature Review with Empirical Insights. |
| 2024 | Ahmad, H., Ullah, F., & Jafri, R. (2024). A Survey on Immersive Cyber Situational Awareness Systems. |
| 2022 | Ahmad, H. (2022). "I think this is the most disruptive technology": Exploring Sentiments of ChatGPT Early Adopters using Twitter Data. DOI |
| 2021 | Ahmad, H., Dharmadasa, I., Ullah, F., & Babar, M. A. (2021). A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures.. |
-
Secured a Seed Grant as Principal Investigator from the School of Computer and Mathematical Sciences, University of Adelaide, to advance focused research on Security for AI with end-to-end AI pipeline security. (2025)
-
Awarded a competitive travel grant to travel to Macau, China, and present my research at the 32nd Asia-Pacific Software Engineering Conference. (2025)
-
Awarded competitive funding through the CSIRO ON Prime Innovation Program to support customer discovery, market validation, and research commercialization. (2025)
-
Awarded a Seed-Start grant of AUD 100,000 from the Department of State Development South Australia, to enhance the digital operations of Migrova through AI-driven technology integration. (2024)
- Awarded three Research Training Program (RTP) Scholarships at the University of Adelaide, which facilitated my doctoral research expenditures.
- University of Adelaide Research Scholarship [AUD 88,250] (2022)
- Cyber Security CRC Postgraduate Research Scholarship [AUD 75,000] (2022)
- School of Computer Science Scholarship [AUD 85,791] (2021)
-
Awarded AUD 5,000 Google Cloud Grant to support R&D on microservice auto-scaling operations. (2024)
-
Awarded AUD 8,000 AWS Cloud Grant to support R&D on microservice auto-scaling operations. (2023)
-
Recipient of AUD 15,000 Financial Assistance Award by the GIK Institute of Engineering Sciences and Technology for four-year undergraduate studies. (2013)
| Term | Course Code | Course Name | Role |
| Semester 1, 2026 | INFO 6004 | Cloud Security | Lecturer and Course Coordinator |
| Semester 1, 2026 | COMP SCI 7100B | Research Project Master Computer Science, Part B | Project Supervisor |
| Trimester 3, 2025 | COMP SCI 7205B | Artificial Intelligence and Machine Learning Research Project, Part B | Project Supervisor |
| MATHS 7097A | Data Science Research Project Part A | Project Supervisor | |
| Semester 2, 2025 | COMP SCI 7100A | Research Project Master Computer Science, Part A | Project Supervisor |
| COMP SCI 7100B | Research Project Master Computer Science, Part B | Project Supervisor | |
| COMP SCI 3021 | Industry Project in Information Technology | Lecturer and Course Coordinator | |
| COMP SCI 3021MELB | Industry Project in Information Technology (Melbourne Campus) | Course Coordinator | |
| Trimester 2, 2025 | COMP SCI 7205B | Artificial Intelligence and Machine Learning Research Project, Part B | Project Supervisor |
| COMP SCI 7209 | Big Data Analysis and Project | Lecturer and Course Coordinator | |
| COMP SCI 7328 | Concepts in Cyber Security | Lecturer and Course Coordinator | |
| COMP SCI 7205A | Artificial Intelligence and Machine Learning Research Project, Part A | Project Supervisor | |
| Semester 1, 2025 | COMP SCI 7098 | Master of Computing & Innovation Project | Project Supervisor |
| COMP SCI 7100A | Research Project Master Computer Science‚ Part A | Project Supervisor | |
| Trimester 1, 2025 | COMP SCI 7205A | Artificial Intelligence and Machine Learning Research Project, Part A | Project Supervisor |
| COMP SCI 7102B | Cyber Security Industry Project B | Project Supervisor | |
| Trimester 1, 2024 | COMP SCI 7101B | Cyber Security Research Project B | Project Supervisor |
| Semester 1, 2024 | COMP SCI 7100A | Research Project Master Computer Science, Part A | Project Supervisor |
| Semester 2, 2024 | COMP SCI 7100B | Research Project Master Computer Science, Part B | Project Supervisor |
| COMP SCI 3021 | Industry Project in Information Technology | Project Supervisor | |
| Trimester 2, 2023 | COMP SCI 7101A | Cyber Security Research Project A | Project Supervisor |
| Trimester 3, 2023 | COMP SCI 7101A | Cyber Security Research Project A | Project Supervisor |
| COMP SCI 7101B | Cyber Security Research Project B | Project Supervisor |
Teaching Philosophy
My teaching philosophy is primarily driven by the following four features.
- Industry relevance. I keep an eye on industry needs and aim to align my teaching in a way that best relates the content to the industry needs. This helps to enable the students to develop knowledge and learn skills that are directly used in the industry.
- Feedback-driven. I am always keen to learn from students how best the course can be taught to convey the maximum value to the students. Also, I observe the students' responses throughout and adjust the path of teaching continuously.
- Organized and well-defined. I believe that each aspect (e.g., lecture, assignments, evaluation rubrics, etc.) of teaching should be entirely organized and clear. This helps students to plan and follow the course clearly and neatly right from the beginning.
- Up-to-date. Computer science is a field that evolves quite rapidly. I aim to keep the content of the course as up-to-date as possible. This helps students to not stick to content that is no longer used in the field. Rather, the students learn content that they can directly use in the field.
| Date | Role | Research Topic | Location | Program | Supervision Type | Student Load | Student Name |
|---|---|---|---|---|---|---|---|
| 2025 - ongoing | Principal Supervisor | Agentic AI Powered Next-Generation Recommendation System | The University of Adelaide | Master of Computer Science | Master | Full Time | Vinith Raj |
| 2025 - ongoing | Principal Supervisor | SAFE-AIMS: Securing AI Model Storage with NIST Framework | The University of Adelaide | Master of Computer Science | Master | Full Time | Palak Teotia |
| 2025 - ongoing | Principal Supervisor | Design and Evaluation of Security Vulnerability Databases | The University of Adelaide | Master of Computer Science | Master | Full Time | Siying Ren |
| 2025 - ongoing | Principal Supervisor | Multi-agent Intervention in Neurodevelopmental Disorder System | The University of Adelaide | Master of Computer Science | Master | Full Time | Sumaiya Usman |
| 2025 - ongoing | Principal Supervisor | MuseTune: LLM-Driven Songwriting using Sentiment-Based Chord Mapping | The University of Adelaide | Master of Computer Science | Master | Full Time | Arpit Soni |
| 2025 - ongoing | Principal Supervisor | SITARAM: Secure IoT Trustworthy AI-driven Resilient Adaptive Mechanism | The University of Adelaide | Master of Computer Science | Master | Full Time | Sanjay Poptani |
| 2025 - 2025 | Principal Supervisor | Agentic AI for Software Security | The University of Adelaide | Master of Artificial Intelligence and Machine Learning | Master | Full Time | Joel Thomas, Asrul Arifin, Rohan Kosuri, Kamalesh Gunasekaran, Deepak Vasudevan |
| 2025 - 2025 | Principal Supervisor | Optimizing Prompt Engineering through Evolutionary Computation | The University of Adelaide | Master of Computer Science | Master | Full Time | Zijie Luo, Gaurav Singh, Jiyin Shao, Aditya Karthully, Fuliang Zhang |
| 2025 - 2025 | Principal Supervisor | Evaluating the Performance of Large Language Models | The University of Adelaide | Master of Computer Science | Master | Full Time | Durga Chodavarapu, Subin Santhosh, Yinzhi Tian, Tuhin Anand, Samman Hossain |
| 2025 - 2025 | Principal Supervisor | Horizontal Pod Auto-scaling of Software Systems Using Multi-Metric Optimization | The University of Adelaide | Master of Computing and Innovation | Master | Full Time | Han-Hsien Lei, Hao Jiang, Linxin Qi, Feng Cao, Wu-Yang Wen |
| 2025 - 2025 | Principal Supervisor | A Self-Adaptive Framework for Software Security | The University of Adelaide | Master of Computing and Innovation | Master | Full Time | Yiqi Wang, Enze Li, Enjian Mai, Yansong Zhang, Mutian Qiu |
| 2025 - 2025 | Principal Supervisor | A Comparative Study of AI Models for Recommendation Systems | The University of Adelaide | Master of Computing and Innovation | Master | Full Time | Manhong Chen, Zihan Luo, Ziyan Zhao, Jianing Dang, Jianghao Jin |
| 2025 - 2025 | Principal Supervisor | Adaptive Cyber Deception for Enhancing Enterprise Network Security | The University of Adelaide | Master of Artificial Intelligence and Machine Learning | Master | Full Time | Pemba Sherpa, Majdi Almistehi, Menuja Mabotuwana |
| 2025 - 2025 | Principal Supervisor | AI for Scalable Microservice Architectures | The University of Adelaide | Master of Artificial Intelligence and Machine Learning | Master | Full Time | Mohammed Ribin, Akash Kumar |
| 2025 - 2025 | Principal Supervisor | Enhancing Real-Time Messaging Security using RSA Cryptography | The University of Adelaide | Master of Cyber Security | Master | Full Time | Sebastian Maximilien |
| 2024 - 2024 | Principal Supervisor | AI-Driven Migration Services in Australia | The University of Adelaide | Bachelor of Information Technology | Honours | Full Time | Ho Yin LI, Jiazhi Chen, Kun Fai Lei, Xiao Han, Yiu Lung Tam, Zhenyang LI |
| 2024 - 2024 | Principal Supervisor | Advancing Cybersecurity Vulnerability Assessment with Large Language Models | The University of Adelaide | Master of Computer Science | Master | Full Time | Shivansh Chopra |
| 2023 - 2024 | Principal Supervisor | Microservice Vulnerability Analysis: A Literature Review With Empirical Insights | The University of Adelaide | Master of Cyber Security | Master | Full Time | Raveen Kanishka Jayalath |
| 2023 - 2023 | Principal Supervisor | Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures | The University of Adelaide | Master of Cyber Security | Master | Full Time | Majid Abdulsatar |