Prof Hung Nguyen

Professor

School of Computer Science and Information Technology

College of Engineering and Information Technology

Eligible to supervise Masters and PhD - email supervisor to discuss availability.


I am a professor in the school of computer and mathematical sciences and the leader of the Information warfare and advanced cyber theme within the Defence trailblazer, the University of Adelaide. I'm leading a research group on Cyber-AI, applying new advances in AI to solve problems in network reliability and security. We focus on developing autonomous and provable cyber defensive solutions. This means building and configuring systems that are secure by design and training trustworthy AI agents to help defend networked systems. By employing tools from graph theory, game theory and AI/ML we are able to develop practical solutions that help human operators deal with the complexity, fast-paced and deceptive nature of the cyber environments.I’m an associate editor for (1) IEEE Transactions on Artificial Intelligence and (2) Elsevier Ad-Hoc Networks journals and I’m on the technical program committees for the following upcoming conferences (1) AAMAS 2026 (CORE A*), (2) AAAI 2026 (CORE A), and (3) The Web Conference 2026 (CORE A*).For most recent updates to my work (especially code, data and papers), please visit https://hxnguyen.github.io.

Since 2009, I have been developing autonomous and provable techniques for securing the information environment. This means building and configuring systems that are secure by design, not just addressing problems when they strike. By leveraging tools from graph theory, game theory and AI/ML we build practical solutions that help human operators deal with the complexity, fast-paced and deceptive nature of the cyber environments. Our research program is supported by multiple grants from Defence and the Australian Research Council - current projects are shown below.

Current Projects

For details of these projects, please contact me directly.

Find out more about my research publications at my Google scholar page.

Tools and Datasets

  • We built ADSynthesizer (available at https://adsynthesizer.github.io/) to fill the current gap in realistic
    data for research and education in Active directory security. Our tool constructs
    abstract metagraph models for Active Directory graphs based on design principles and guidelines
    from Microsoft and cyber experts.
  • My paper on network auto-configuration in 2010 started the Autonetkit software (ANK). ANK is currently being used as the auto-configuration tool for the Cisco VIRL simulation and emulation environment. See for example here.
  • The Internet Topology Zoo that I helped build  is widely used in all areas of networking research and development worldwide and has been cited  more than 1200 times.

Commercial Software and Products

  • I helped build the TEMS capacity management software for 4G/5G networks – was used in production environments of Telstra and Ooredoo – managing billion dollars of assets.
  • FogNet  Radio Simulation Tool 

Date Position Institution name
2025 - ongoing Professor University of Adelaide
2021 - 2024 Associate Professor University of Adelaide

Language Competency
English Can read, write, speak, understand spoken and peer review
Vietnamese Can read, write, speak, understand spoken and peer review

Date Institution name Country Title
2004 - 2008 École Polytechnique Fédérale de Lausanne Switzerland PhD

Year Citation
2025 Goel, D., Ward, M., Neumann, A., Neumann, F., Nguyen, H., & Guo, M. (2025). Hardening Active Directory Graphs via Evolutionary Diversity Optimization based Policies. ACM Transactions on Evolutionary Learning and Optimization, 5(3), 1-36.
DOI Scopus2
2025 Nguyen, N., Nguyen, D., Kim, J., Rizzo, G., & Nguyen, H. (2025). Survive and Thrive: Decentralized Multi-Agent Coordination Under Attrition Risks. IEEE Transactions on Mobile Computing, 1-17.
DOI
2024 Arsalaan, A. S., Fida, M. R., & Nguyen, H. X. (2024). UAVs Relay in Emergency Communications with Strict Requirements on Quality of Information. IEEE Transactions on Vehicular Technology, 74(3), 1-16.
DOI Scopus3 WoS3
2024 Nguyen, B. L., Nguyen, D. D., Nguyen, H. X., Ngo, D. T., & Wagner, M. (2024). Multi-Agent Task Assignment in Vehicular Edge Computing: A Regret-Matching Learning-Based Approach. IEEE Transactions on Emerging Topics in Computational Intelligence, 8(2), 1527-1539.
DOI Scopus6 WoS5
2024 Dinani, M. A., Holzer, A., Nguyen, H., Marsan, M. A., & Rizzo, G. (2024). A Gossip Learning Approach to Urban Trajectory Nowcasting for Anticipatory RAN Management. IEEE Transactions on Mobile Computing, 23(5), 6288-6303.
DOI Scopus1 WoS1
2024 Nguyen, N., Nguyen, D., Kim, J., Rizzo, G., & Nguyen, H. (2024). Decentralized Coordination for Multi-Agent Data Collection in Dynamic Environments. IEEE Transactions on Mobile Computing, 23(12), 1-16.
DOI Scopus4 WoS1
2023 Nguyen, H., Sun, X., Lu, Q., Zhang, Q., & Li, M. (2023). Bayesian heterogeneous degradation performance modeling with an unknown number of sub-populations. Quality and Reliability Engineering International, 39(7), 2686-2705.
DOI Scopus2
2023 Byrne, A. B., Arts, P., Ha, T. T., Kassahn, K. S., Pais, L. S., O'Donnell-Luria, A., . . . Webber, D. L. (2023). Genomic autopsy to identify underlying causes of pregnancy loss and perinatal death. Nature Medicine, 29(1), 180-189.
DOI Scopus46 WoS44 Europe PMC36
2023 Phu, A. T., Li, B., Ullah, F., Ul Huque, T., Naha, R., Babar, M. A., & Nguyen, H. (2023). Defending SDN against packet injection attacks using deep learning. Computer Networks, 234, 109935.
DOI Scopus19 WoS15
2021 Ranathunga, D., Roughan, M., & Nguyen, H. (2021). Mathematical Reconciliation of Medical Privacy Policies. ACM Transactions on Management Information Systems, 12(1), 1-18.
DOI
2021 Sarafraz, M. M., Tran, N. N., Nguyen, H., Fulcheri, L., Burton, R., Wadewitz, P., . . . Hessel, V. (2021). Tri-fold process integration leveraging high- and low-temperature plasmas: From biomass to fertilizers with local energy and for local use. Journal of Advanced Manufacturing and Processing, 3(2), e10081-1-e10081-21.
DOI Scopus19
2021 Arsalaan, A. S., Nguyen, H., Coyle, A., & Fida, M. (2021). Quality of information with minimum requirements for emergency communications. Ad Hoc Networks, 111, 1-14.
DOI Scopus10 WoS6
2021 Hessel, V., Tran, N. N., Orandi, S., Asrami, M. R., Goodsite, M. E., & Nguyen, H. (2021). Continuous-Flow Extraction of Adjacent Metals - a Disruptive Economic Window for In-Situ Resource Utilization of Asteroids?. Angewandte Chemie (International ed. in English), 60(7), 3368-3388.
DOI Scopus18 WoS16 Europe PMC4
2020 Ranathunga, D., Roughan, M., & Nguyen, H. (2020). Verifiable Policy-Defined Networking using Metagraphs. IEEE Transactions on Dependable and Secure Computing, 19(1), 482-494.
DOI Scopus6 WoS6
2019 Le, B., Shen, H., Nguyen, H., & Falkner, N. (2019). Improved network community detection using meta-heuristic based label propagation. Applied Intelligence, 49(4), 1451-1466.
DOI Scopus19 WoS16
2018 Nguyen, D. D., Nguyen, H. X., & White, L. B. (2018). Evaluating performance of RAT selection algorithms for 5G Hetnets. IEEE Access, 6, 61212-61222.
DOI Scopus11 WoS11
2017 Ranathunga, D., Nguyen, H., & Roughan, M. (2017). MGtoolkit: a python package for implementing metagraphs. SoftwareX, 6, 91-93.
DOI Scopus7 WoS7
2017 Nguyen, D., Nguyen, H., & White, L. (2017). Reinforcement learning with network-assisted feedback for heterogeneous RAT selection. IEEE Transactions on Wireless Communications, 16(9), 6062-6076.
DOI Scopus67 WoS51
2016 Ranathunga, D. P., Roughan, M., Nguyen, H., Kernick, P., & Falkner, N. (2016). Case studies of SCADA firewall configurations and the implications for best practices. IEEE Transactions on Network and Service Management, 13(4), 871-884.
DOI Scopus28 WoS17
2013 Nguyen, H., & Roughan, M. (2013). Multi-observer privacy-preserving hidden Markov models. IEEE Transactions on Signal Processing, 61(23), 6010-6019.
DOI Scopus7 WoS3
2013 Nguyen, H., & Roughan, M. (2013). Rigorous statistical analysis of internet loss measurements. IEEE - ACM Transactions on Networking, 21(3), 734-745.
DOI Scopus28 WoS27
2012 Knight, S., Falkner, N., Nguyen, H., Tune, P., & Roughan, M. (2012). I can see for miles: re-visualizing the internet. IEEE Network, 26(6), 26-32.
DOI Scopus17 WoS12
2012 Nguyen, H., & Roughan, M. (2012). Improving hidden Markov model inferences with private data from multiple observers. IEEE Signal Processing Letters, 19(10), 696-699.
DOI Scopus5 WoS4
2011 Knight, S., Nguyen, H., Falkner, N., Bowden, R., & Roughan, M. (2011). The internet topology zoo. IEEE Journal on Selected Areas in Communications, 29(9), 1765-1775.
DOI Scopus1464 WoS1250

Year Citation
2025 Parsonage, E., Ward, M., & Nguyen, H. X. (2025). Higher-Order Graph Models in Network Security. In Proceedings of 2024 14th International Workshop on Resilient Networks Design and Modeling, RNDM 2024 (pp. 1-8). Pompei (Napoli), Italy, Italy: IEEE.
DOI
2025 Zhang, Y., Ward, M., & Nguyen, H. (2025). Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs. In Proceedings IEEE Computer Security Foundations Symposium (pp. 205-219). CA, Santa Cruz: IEEE COMPUTER SOC.
DOI
2025 Ngo, H. Q., Guo, M., & Nguyen, H. X. (2025). Adaptive Wizard for Removing Cross-Tier Misconfigurations in Active Directory. In Ijcai International Joint Conference on Artificial Intelligence (pp. 7661-7669). International Joint Conferences on Artificial Intelligence Organization.
DOI
2024 Nguyen, N., Nguyen, D., Rizzo, G., & Nguyen, H. (2024). United We Stand: Decentralized Multi-Agent Planning with Attrition. In Proceedings of EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE Vol. 392 (pp. 3421-3428). Santiago de Compostela: IOS Press.
DOI Scopus1
2024 Ngo, H. Q., Guo, M., & Nguyen, H. (2024). Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs. In Proceedings - IEEE INFOCOM (pp. 451-460). Vancouver, BC, Canada: IEEE.
DOI Scopus7 WoS2
2024 Guo, M., Li, J., Neumann, A., Neumann, F., & Nguyen, H. (2024). Limited Query Graph Connectivity Test. In M. J. Wooldridge, J. G. Dy, & S. Natarajan (Eds.), Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24) Vol. 38 (pp. 20718-20725). Online: Association for the Advancement of Artificial Intelligence (AAAI).
DOI Scopus5 WoS2
2024 Ngo, H., Guo, M., & Nguyen, H. (2024). Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys. In Proceedings of the Genetic and Evolutionary Computation Conference (pp. 1309-1317). Online: ACM.
DOI Scopus2
2024 Dinani, M. A., Holzer, A., Nguyen, H., Marsan, M. A., & Rizzo, G. (2024). Context-Aware Orchestration of Energy-Efficient Gossip Learning Schemes. In 2024 IEEE 5th World AI IoT Congress, AIIoT 2024 (pp. 192-198). Online: IEEE.
DOI
2024 Nguyen, N. L., Falkner, N., & Nguyen, H. (2024). Demo: Synthesizing Realistic Enterprise Active Directory Attack Graphs with ADSynth. In Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos (pp. 107-109). AUSTRALIA, Sydney: ACM.
DOI
2024 Nguyen, N. L., Falkner, N., & Nguyen, H. (2024). ADSynth: Synthesizing Realistic Active Directory Attack Graphs. In Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024 (pp. 66-74). Brisbane, Australia: IEEE.
DOI Scopus5 WoS2
2024 Zhang, Y., Ward, M., & Nguyen, H. (2024). Practical Anytime Algorithms for Judicious Partitioning of Active Directory Attack Graphs. In IJCAI International Joint Conference on Artificial Intelligence (pp. 7074-7081). Jeju: International Joint Conferences on Artificial Intelligence.
DOI Scopus2
2024 White, L., Nguyen, D., & Nguyen, H. (2024). Satisfaction and Regret in Stackelberg Games. In Unpublished. Auckland New Zealand.
DOI
2023 Chowdhury, A., & Nguyen, H. (2023). CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID, 2023) (pp. 426-439). US: ACM.
DOI Scopus1
2023 Guo, M., Ward, M., Neumann, A., Neumann, F., & Nguyen, H. (2023). Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs. In Proceedings of the 37th AAAI Conference on Artificial Intelligence (AAAI, 2023) Vol. 37 (pp. 5649-5656). Washington, D.C., USA: Association for the Advancement of Artificial Intelligence (AAAI).
DOI Scopus14 WoS7
2023 Goel, D., Neumann, A., Neumann, F., Nguyen, H., & Guo, M. (2023). Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '23) (pp. 1348-1356). New York, NY: Association for Computing Machinery.
DOI Scopus7 WoS3
2023 Chowdhury, A., Nguyen, H., Ashenden, D., & Pogrebna, G. (2023). POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. In Proceedings of the ACM Asia Conference on Computer and Communications Security (pp. 1040-1042). Melbourne, AUSTRALIA: ACM.
DOI Scopus5 WoS2
2023 Zhang, Y., Ward, M., Guo, M., & Nguyen, H. (2023). A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems. In Proceedings of the 18th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS, 2023) (pp. 993-1003). Melbourne Victoria, Australia: Association for Computing Machinery.
DOI Scopus12 WoS7
2023 Ngo, H. Q., Guo, M., & Nguyen, H. (2023). Near Optimal Strategies for Honeypots Placement in Dynamic and Large Active Directory Networks. In N. Agmon, B. An, A. Ricci, & W. Yeoh (Eds.), Proceedings of the 22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2023) Vol. 2023-May (pp. 2517-2519). Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems.
DOI Scopus9
2022 Guo, M., Li, J., Neumann, A., Neumann, F., & Nguyen, H. (2022). Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs. In Proceedings of the 36th AAAI Conference on Artificial Intelligence (AAAI-2022) Vol. 36 (pp. 9360-9367). virtual online: AAAI Press.
DOI Scopus21 WoS16
2022 Goel, D., Ward-Graham, M. H., Neumann, A., Neumann, F., Nguyen, H., & Guo, M. (2022). Defending active directory by combining neural network based dynamic program and evolutionary diversity optimisation. In J. E. Fieldsend, & M. Wagner (Eds.), Proceedings of the Genetic and Evolutionary Computation Conference (GECCO'22) Vol. abs/2204.03397 (pp. 1191-1199). New York, NY: Association for Computing Machinery.
DOI Scopus15 WoS13
2022 Dinani, M. A., Holzer, A., Nguyen, H., Marsan, M. A., & Rizzo, G. (2022). Vehicle Position Nowcasting with Gossip Learning. In IEEE Wireless Communications and Networking Conference, WCNC Vol. 2022-April (pp. 728-733). Online: IEEE.
DOI Scopus4 WoS4
2022 Nguyen, N., Nguyen, D., Kim, J., Rizzo, G., & Nguyen, H. (2022). Multi-Agent Data Collection in Non-Stationary Environments. In Proceedings - 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2022 (pp. 120-129). Online: IEEE.
DOI Scopus3 WoS2
2021 Dinani, M. A., Holzer, A., Nguyen, H., Marsan, M. A., & Rizzo, G. (2021). Gossip learning of personalized models for vehicle trajectory prediction. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshops (WCNCW 2021) (pp. 1-7). virtual online: IEEE.
DOI Scopus15 WoS6
2021 Arsalaan, A. S., Nguyen, H., & Fida, M. (2021). Impact of Bushfire Dynamics on the Performance of MANETs. In Proceedings of the 16th Annual Conference on Wireless On-Demand Network Systems and Services (WONS 2021) (pp. 1-4). online: IEEE.
DOI Scopus2
2020 Nguyen, H., Yego, K., & Sioutis, C. (2020). BGP based software defined networks for resilient combat cloud. In Proceedings of the Military Communications and Information Systems Conference (MilCIS 2020) (pp. 1-6). online: IEEE.
DOI Scopus2
2020 Dinani, M. A., Holzer, A., Nguyen, H., Marsan, M. A., & Rizzo, G. (2020). Poster: Mobile Gossip Learning for Trajectory Prediction. In IEEE Vehicular Networking Conference, VNC Vol. 2020-December (pp. 1-2). online: IEEE.
DOI Scopus2
2019 Arsalaan, A., Nguyen, H., & Coyle, A. (2019). Evaluating the Performance of QoI Algorithms in Realistic MANETs. In 2018 28th International Telecommunication Networks and Applications Conference, ITNAC 2018 (pp. 101-106). Univ New S Wales, Kensington Campus, Sydney, AUSTRALIA: IEEE.
DOI Scopus3 WoS2
2019 Pham, T. T., Nguyen, H., & McMahon, J. (2019). Enabling Heterogeneous 5G Simulations with SDN Adapters. In Springer Proceedings of 14th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities Vol. 309 LNICST (pp. 163-183). Switzerland: Springer.
DOI Scopus3
2019 Manzo, G., Otálora, S., Braun, T., Ajmone Marsan, M., Rizzo, G., & Nguyen, H. (2019). DeepFloat: Resource-Efficient Dynamic Management of Vehicular Floating Content. In Proceedings of the 31st International Teletraffic Congress, ITC 2019 (pp. 46-54). online: IEEE.
DOI Scopus4 WoS2
2018 Coyle, A., Nguyen, H., Boyd, P., & Judd, G. (2018). Improving the Performance of Land Tactical Digital Networks Using Measures of Network Capacity. In 2018 Military Communications and Information Systems Conference, MilCIS 2018 - Proceedings (pp. 6 pages). Canberra, AUSTRALIA: IEEE.
DOI Scopus3 WoS1
2017 Le, B., Nguyen, H., Shen, H., & Falkner, N. (2017). GLFR: a generalized LFR benchmark for testing community detection algorithms. In ICCCN 2017: 2017 26th International Conference on Computer Communications and Networks (ICCCN) (pp. 8038442-1-8038442-9). Vancouver: IEEE.
DOI Scopus4
2016 Nguyen, H., Nguyen, D. D., Pham, T., Hoang, K., & Parsonage, E. (2016). A prototype of policy defined wireless access networks. In Proceedings of the 26th International Telecommunication Networks and Applications Conference (ITNAC 2016) (pp. 101-106). Piscataway, NJ: IEEE.
DOI Scopus2
2016 Nguyen, H., Webb, M., & Naguleswaran, S. (2016). Achieving policy defined networking for military operations. In Proceedings of the 2016 Military Communications and Information Systems Conference (MilCIS) (pp. 1-6). Canberra, Australia: IEEE.
DOI Scopus3
2016 Nguyen, D. D., Nguyen, H. X., & White, L. B. (2016). Performance of adaptive RAT selection algorithms in 5G heterogeneous wireless networks. In Proceedings of the 26th International Telecommunication Networks and Applications Conference (ITNAC 2016) (pp. 1-6). Piscataway, NJ: IEEE.
DOI Scopus5 WoS3
2016 Nguyen, D., White, L., & Nguyen, H. (2016). Adaptive multiagent reinforcement learning with non-positive regret. In B. Kang, & Q. Bai (Eds.), Proceedings of the 29th Australasian Joint Conference on Artificial Intelligence Vol. 9992 LNAI (pp. 29-41). Hobart, Tas: Springer.
DOI Scopus2
2016 Le, B., Nguyen, H., & Shen, H. (2016). Community detection in networks with less significant community structure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10086 LNAI (pp. 65-80). Switzerland: Springer International Publishing AG.
DOI Scopus2
2016 Nguyen, H., & Northcote, B. (2016). User spectral efficiency: combining spectral efficiency with user experience. In Proceedings of the 2016 IEEE International Conference on Communications (ICC): Communications for all things (pp. 1-6). Kuala Lumpur, Malaysia: IEEE.
DOI Scopus2
2016 Ranathunga, D., Roughan, M., Kernick, P., Falkner, N., Nguyen, H., McClintock, M., & Mihailescu, M. (2016). Verifiable policy-defined networking for security management. In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications Vol. 4 (pp. 344-351). Lisbon, Portugal: SCITEPRESS.
DOI Scopus3 WoS3
2015 Mihailescu, M., Nguyen, H., & Webb, M. (2015). Enhancing wireless communications with software defined networking. In Proceedings of the Military Communications and Information Systems Conference (pp. 1-6). Canberra, ACT, Australia: IEEE.
DOI Scopus14 WoS2
2015 Ranathunga, D., Roughan, M., Kernick, P., Falkner, N., & Nguyen, H. (2015). Identifying the missing aspects of the ANSI/ISA best practices for security policy. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 37-48). Singapore, Republic of Singapore: ACM.
DOI Scopus6
2013 Tune, P., Nguyen, H., & Roughan, M. (2013). Hidden Markov model identifiability via tensors. In IEEE International Symposium on Information Theory, ISIT 2013 (pp. 2299-2303). Online: IEEE.
DOI Scopus4 WoS3
2013 Knight, S., Nguyen, H., Maennel, O., Phillips, I., Falkner, N., Bush, R., & Roughan, M. (2013). An automated system for emulated network experimentation. In Proceedings of the 9th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2013 (pp. 235-246). USA: Association for Computing Machinery.
DOI Scopus9 WoS6
2012 Nguyen, H., & Roughan, M. (2012). Multi-observer privacy-preserving hidden Markov models. In Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012 (pp. 514-517). USA: IEEE.
DOI Scopus6 WoS4
2012 Nguyen, H., & Roughan, M. (2012). On the identifiability of multi-observer hidden Markov models. In Proceedings of the 2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2012 (pp. 1873-1876). USA: IEEE.
DOI Scopus4 WoS2
2011 Parsonage, E., Nguyen, H., & Roughan, M. (2011). Absorbing lexicographic products in metarouting. In Proceedings of 1st International Workshop on Rigorous Protocol Engineering (WRiPE) 2011 (pp. 1-6). Vancouver, Canada.
2011 Parsonage, E., Nguyen, H., Bowden, R., Knight, S., Falkner, N., & Roughan, M. (2011). Generalized graph products for network design and analysis. In Proceedings of the 19th EEE International Conference on Network Protocols (pp. 79-88). USA: IEEE.
DOI Scopus22 WoS4
2011 Bowden, R., Nguyen, H., Falkner, N., Knight, S., & Roughan, M. (2011). Planarity of data networks. In Proceedings of the 2011 23rd International Teletraffic Congress (pp. 254-261). USA: ITC Press.
Scopus9
2010 Coyle, A., & Nguyen, H. (2010). A frequency control algorithm for a mobile adhoc network. In Proceedings of Military Communications and Information Systems Conference (pp. 1-6). Canberra, ACT.
2010 Nguyen, H., Roughan, M., Knight, S., Falkner, N., Maennel, O., & Bush, R. (2010). How to build complex, large-scale emulated networks. In Proceedings of TridentCom 2010 Vol. 46 (pp. 1-14). www: ICST.
DOI Scopus4
2010 Nguyen, H., & Roughan, M. (2010). Rigorous statistical analysis of internet loss measurements. In ACM SIGMETRICS Performance Evaluation Review Special Issue Vol. 38 (pp. 361-362). United States: Association for Computing Machinery, Inc..
DOI Scopus6 WoS2
2010 Ghita, D., Nguyen, H., Kurant, M., Argyraki, K., & Thiran, P. (2010). Netscope: practical network loss tomography. In 2010 Proceedings of IEEE INFOCOM (pp. 1-9). San Diego, CA: IEEE.
DOI Scopus55
2009 Nguyen, H., Teixeira, R., Thiran, P., & Diot, C. (2009). Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis. In Proceedings of the IEEE INFOCOM Conference 2009 (pp. 1-9). USA: IEEE.
DOI Scopus11
2008 Nguyen, H., Figueiredo, D., Grossglauser, M., & Thiran, P. (2008). Balanced relay allocation on heterogeneous unstructured overlays. In INFOCOM 2008: The 27th Conference on Computer Communications IEEE (pp. 126-130). Online: IEEE.
DOI Scopus9
2008 Nguyen, H., & Roughan, M. (2008). On the correlation of internet packet losses. In Proceeding of the Australasian Telecommunication Networks and Applications Conference (pp. 1-6). CD: IEEE.
DOI Scopus6 WoS2
2007 Nguyen, H., & Thiran, P. (2007). The boolean solution to the congested IP link location problem: theory and practice. In IEEE INFOCOM 2007 26th IEEE International Conference on Computer Communications (pp. 2117-2125). Online: IEEE.
DOI Scopus112
2007 Nguyen, H., & Thiran, P. (2007). Network loss inference with second order statistics of end-to-end flows. In Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, San Diego, USA, 24-26 October, 2007 (pp. 227-240). New York: ACM.
DOI Scopus72
2006 Nguyen, H., & Thiran, P. (2006). Using end-to-end data to infer lossy links in sensor networks. In IEEE INFOCOM 2006 Proceedings of the 25th IEEE International Conference on Computer Communications (pp. 1-12). Online: IEEE.
DOI Scopus61
2005 Dousse, O., Nguyen, H., & Thiran, P. (2005). Deux applications de processus ponctuels aux réseaux de communication. In 20th GRESTI Symposium on Signal and Image Processing 2005 (pp. 269-272). Louvain-la-Neuve, Belgium.
2005 Nguyen, H., & Thiran, P. (2005). Binary Versus Analogue Path Monitoring in IP Networks. In Passive and Active Network Measurement: Lecture Notes in Computer Science, Vol. 3431, 6th International Workshop 2005 Proceedings. Vol. 3431 (pp. 97-107). Germany: Springer.
DOI Scopus4
2005 Nguyen, H., & Thiran, P. (2005). Failure location in transparent optical networks: The asymmetry between false and missing alarms. In 19th International Teletraffic Congress (ITC 19) 2005. Performance Challenges for Efficient Next generation networks (pp. 991-1000). Beijing, China.
2004 Nguyen, H., & Thiran, P. (2004). Active Measurement for Multiple Link Failures Diagnosis in IP Networks. In Passive and Active Network Measurement: Lecture Notes in Computer Science, Vol. 3051, Proceedings of the Workshop on Passive and Active Measurements (PAM) Vol. 3015 (pp. 185-194). Berlin: Springer-Verlag.
DOI Scopus34
2004 Nguyen, H., Thiran, P., & Barakat, C. (2004). On the correlation of TCP traffic in backbone networks. In IEEE International Symposium on Circuits and Systems (ISCAS) 2004 Proceedings Vol. 5 (pp. 481-484). Online: IEEE.
Scopus2
2001 Nguyen, H., Rajesh, S., & Abbott, D. (2001). Motion detection algorithms using template model. In N. W. Bergmann (Ed.), Proceedings of SPIE - The International Society for Optical Engineering Vol. 4591 (pp. 78-90). PO BOX 10 BELLINGHAM WASHINGTON USA: THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERING.
DOI Scopus3 WoS2

Year Citation
2018 Tran, Q. D., Tran, N. N., Hessel, V., Shen, S., Nguyen, H., & Arjomandi, M. (2018). Guardian Satellite-based Flow-Chemistry System Producing Quantum Dots as Counter Measure to Divert Missile Attack. Poster session presented at the meeting of 18th Australian Space Research Conference.
DOI
2016 Nguyen, H., Naguleswaran, S., & Webb, M. (2016). Emergency Communication in Australia: Current Situation and Future Directions. Poster session presented at the meeting of Proceedings of The 5th Disaster and Emergency Management Conference. Gold Coast, QLD, Australia.
2013 Ager, B., Balduzzi, M., Barlet-Ros, P., Carvalho, P., Casas, P., Celeda, P., . . . Xie, L. (2013). Welcome message from the WNM chairs. Poster session presented at the meeting of Proceedings - Conference on Local Computer Networks, LCN. Sydney, Australia: IEEE.
DOI

Year Citation
2019 Britton, M., & Nguyen, H. (2019). Land C3 Communications Modelling and Simulation:
Tranche 1 Scoping Study.
2019 Wang, G., Costa, A., Northcote, B., Nguyen, H., Warner, N., McMahon, J., & Mihailescu, M. (2019). TEMS™ Capacity Manager Vodafone Fiji Capacity Analysis Project Report - 2019.
2019 Wang, G., Warner, N., Costa, A., Northcote, B., Mihailescu, M., McMahon, J., & Nguyen, H. (2019). TEMS™ Capacity Manager IndoSat Capacity Analysis Project Report.
2018 Wang, G., Northcote, B., Costa, A., McMahon, J., Warner, N., Mihailescu, M., & Nguyen, H. (2018). TEMS™ Capacity Manager Vodafone Fiji Capacity Analysis Project Report.
2018 Britton, M. S., & Nguyen, H. (2018). BCS(L) NETWORK TRAFFIC MODELLING, Milestone Report #8.
2018 Britton, M. S., & Nguyen, H. (2018). BCS(L) NETWORK TRAFFIC MODELLING Milestone Report #7.
2018 Britton, M. S., & Nguyen, H. (2018). BCS(L) NETWORK TRAFFIC MODELLING Milestone Report #6.
2018 Britton, M. S., & Nguyen, H. (2018). BCS(L) NETWORK TRAFFIC MODELLING Lessons Learnt Report.
2018 Britton, M. S., & Nguyen, H. (2018). BCS(L) NETWORK TRAFFIC MODELLING Quarterly Report #2.
2018 Britton, M. S., & Nguyen, H. (2018). BCS(L) NETWORK TRAFFIC MODELLING Quarterly Report #1.
2018 Costa, A., & Hung, N. (2018). Analysis of Uniti Wireless Speed Test Data.
2016 Coyle, A. J., Nguyen, H., & Northcote, B. (2016). Tactical Radio Modelling - Overview Report.
2015 Northcote, B., Warner, N., McMahon, J. J., Coyle, A., Costa, A., Mihailescu, M., . . . Britton, M. (2015). Devil WCDMA network dimensioning 2015 workshop. Telstra.
2015 Northcote, B., Costa, A., McMahon, J. J., Nguyen, H., Oliu, C., & FitzGerald, D. (2015). TEMS™ Capacity Manager Guadalajara Capacity Analysis Project Validation Report Prepared for AT&T Mexico: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
2015 Northcote, B., Costa, A., Nguyen, H., & FitzGerald, D. (2015). TEMS™ Capacity Manager Dar Es Salam Capacity Analysis Report Prepared for Airtel Tanzania: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
2015 Northcote, B., Costa, A., Nguyen, H., Warner, N., & FitzGerald, D. (2015). TEMS™ Capacity Manager Mandalay Capacity Analysis Report Prepared for Ooredoo Myanmar: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
2015 Northcote, B., Costa, A., Nguyen, H., Warner, N., & FitzGerald, D. (2015). TEMS™ Capacity Manager Mandalay Capacity Analysis Project Validation Report Prepared for Ooredoo Myanmar: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
2015 Northcote, B., McMahon, J. J., Nguyen, H., Brooks, T., & FitzGerald, D. (2015). TEMS™ Capacity Manager Atlanta Capacity Analysis Report Prepared for AT&T USA: TEMS™ Capacity Manager Client Capacity Analysis Project Reports. Reston, VA, USA: The University of Adelaide.
2014 Nguyen, H., & Costa, A. (2014). SAPN Restoration Analysis Forecast Tool v1.0.
2014 Nguyen, H., & Webb, M. R. (2014). Wireless Mesh and Backhaul Solutions for Responder Check-in Systems.
2014 Northcote, B., Warner, N., McMahon, J. J., Coyle, A., Costa, A., Mihailescu, M., . . . Li, Y. (2014). Devil WCDMA network dimensioning 2014 workshop. Telstra.
2013 Northcote, B., Warner, N., Coyle, A., Costa, A., Mihailescu, M., Nguyen, H., . . . Li, Y. (2013). Devil WCDMA network dimensioning 2013 workshop. Telstra.
2012 Northcote, B., Warner, N., Coyle, A., Costa, A., Mihailescu, M., Nguyen, H., . . . Yates, S. (2012). Devil WCDMA network dimensioning 2012 workshop. Telstra.
2012 Britton, M., Naguleswaran, S., Nguyen, H., Coyle, A., Yates, S., & Mihailescu, M. (2012). FogNet v4.0 User Guide.
2011 Coyle, A., Nguyen, H., Naguleswaran, S., Britton, M., Porter, C., & Webb, M. R. (2011). SANLab Year 3 Report.
2010 Coyle, A., Nguyen, H., Naguleswaran, S., Britton, M., Porter, C., & Webb, M. R. (2010). SANLab Year 2 Report.

Year Citation
2018 Nguyen, D. D. (2018). Adaptive Reinforcement Learning for Heterogeneous Network Selection. (PhD Thesis, The University of Adelaide).
2008 Nguyen, H. (2008). User-level Internet tomography and overlay routing. (PhD Thesis, Thèse École polytechnique fédérale de Lausanne EPFL).

Year Citation
2016 Nguyen, D. U. O. N. G., Nguyen, H. U. N. G., & White, L. A. N. G. (2016). Distributed RAT Selection with Enhanced Reinforcement Learning. Technical Report, The University of Adelaide.
DOI
2009 Nguyen, H., Denisa, G., Kurant,, M., Argyraki, K., & Thiran, P. (2009). Fundamental Properties of Routing Matrices and Their Implications for Network Tomography. Technical Report, Swiss Federal Institute of Technology, Lausanne (EPFL).

Year Citation
2024 White, L., Nguyen, D., & Nguyen, H. (2024). Satisfaction and Regret in Stackelberg Games. AAMAS 2024, Aukland, New Zealand 6-10 May 2024.
DOI
2023 White, L., Oskar, R., Nguyen, D., & Nguyen, H. (2023). Bayesian Rationality in Satisfaction Games. AAMAS 2023, London UK, May 29 - 2 June, 2023.
DOI
2023 Nguyen, D., White, L., & Nguyen, H. (2023). Social Optimum Equilibrium Selection for Distributed Multi-Agent Optimization. AAMAS 2023, London UK, 29 May - 2 June, 2023.
DOI

Year Citation
2019 Costa, A., Northcote, B., McMahon, J., Warner, N., Nguyen, H., Mihailescu, M., & Wang, G. (2019). Telstra Devil Mobile Networks Capacity Planning Tool Release 2019 (Version 2019) [software].
2018 Costa, A., Northcote, B., McMahon, J., Warner, N., Mihailescu, M., Nguyen, H., & Wang, G. (2018). Telstra Devil Mobile Networks Capacity Planning Tool Release 2018 (Version 2018) [software].
2017 Costa, A., Northcote, B., Warner, N., McMahon, J. J., Nguyen, H., Mihailescu, M., & Wang, G. (2017). Telstra Devil Mobile Networks Capacity Planning Tool 2017 Release (Version 2017) [Computer Software].
2017 Costa, A., Wang, G., Mihailescu, M., & Nguyen, H. (2017). SAPN ERT Tool - Expected Restoration Time Analytics (Version 2.0) [software]. Adelaide: TRC.
2016 Costa, A., Northcote, B., Warner, N., Mihailescu, M., McMahon, J., Nguyen, H., & Wang, G. (2016). Telstra Devil Mobile Networks Capacity Planning Tool 2016 Release (Version v2016) [software]. Adelaide: -.
2015 Northcote, B., Warner, N., Coyle, A., McMahon, J. J., Mihailescu, M., Costa, A., . . . Britton, M. (2015). TelAri Analytics v2.0 [Computer Software].
2014 Nguyen, H., & Costa, A. (2014). SAPN Restoration Analysis Forecast Tool v1.0 [Computer Software].
2014 Northcote, B., Warner, N., Coyle, A., Yates, S., McMahon, J. J., Mihailescu, M., . . . Li, Y. (2014). TelAri Analytics v1.2 [Computer Software].
2013 Northcote, B., Warner, N., Coyle, A., Yates, S., Mihailescu, M., Costa, A., . . . Li, Y. (2013). TelAri Analytics v1.1 [Computer Software].
2012 Northcote, B., Warner, N., Coyle, A., Yates, S., Mihailescu, M., Costa, A., . . . Li, Y. (2012). TelAri Analytics v1.0 [Computer Software].
2012 Britton, M., Naguleswaran, S., Nguyen, H., Coyle, A., Yates, S., & Mihailescu, M. (2012). FogNet v4.0 [Computer Software].

Year Citation
2022 Guo, M., Ward, M., Neumann, A., Neumann, F., & Nguyen, H. (2022). Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs..

Over last five years I have been responsible for securing research funding worth over $9M – most if not all
are in the area of networks and security. I am the leading chief investigator and/or technical lead for $8M
of this funding. The grants comprise of 1 Defence trailblazer project, 3 Next Generation Technology Fund
(NGTF), 8 direct Defence research projects, 1 Industry funded project, 1 ARC NISRDG grant, 1 Linkage
grant as the first named chief investigator, and 1 ARC LIEF grant. Three of these projects started in 2024
and six are on-going with a total funding of $5.05M that enables me to build a substantial research group
and research programs. We have made great progress with the projects with significant publications and
capabilities delivered to the customers.

I co-lead (with Prof. Salil Kanhere, UNSW) the Advanced Cyber and IW theme of the Defence Traiblazer - a joint initiative between UoA and UNSW with a total funding of ~$240M (over 4 years, 6 themes).

Highlights of my teaching include

  • My student evaluations (SELTs) are consistently extremely high; I have been well above the School, Faculty, and University averages for every question in every semester I have taught.
  • I was nominated for a Faculty of SET Excellence in Teaching Award for my lecturing in 2022.

Details of the courses that I developed and taught are given below.
Lecturing

  • 2023 Cybersecurity fundamentals (CS3308) 238 students
  • 2023 Hot Topics in IoT Security (CS7106 50 students
  • 2022 Hot Topics in IoT Security (CS7106 12 students

Course coordination

  • 2023 Cybersecurity fundamentals (CS3308) 238 students
  • 2023 Parallel and Distributed Computing (CS 3305/3705) 125 students
  • 2023 Hot Topics in IoT Security 50 students
  • 2023 Applied Privacy course 20 students
  • 2022 Hot topics in IoT security 12 students
  • 2022 Parallel and distributed computing 108 students

Course development

  • 2022: I designed and developed on my own the entire course materials (lectures, workshops, and assignments) for Hot topics in IoT Security
  • 2022: I developed the Master level course for Applied Privacy

 

Date Role Research Topic Program Degree Type Student Load Student Name
2025 Co-Supervisor Collecting and analysing real-world network topologies for novel algorithm application. Master of Philosophy Master Full Time Mr Benjamin Jack Lang
2025 Principal Supervisor A Categorical Approach to Explainable Artificial Intelligence in Machine Learning Master of Philosophy Master Full Time Mr Quoc Dat Ngo
2025 Principal Supervisor Quantum Error Correction in Quantum Network Simulations Master of Philosophy Master Part Time Mr Md Samir Khan
2025 Principal Supervisor Soft Prompt Protection Against Adversrial Attack For Large Language Model Application Doctor of Philosophy Doctorate Full Time Mr Jinyang Li
2025 Principal Supervisor Soft Prompt Protection Against Adversrial Attack For Large Language Model Application Doctor of Philosophy Doctorate Full Time Mr Jinyang Li
2025 Principal Supervisor A Categorical Approach to Explainable Artificial Intelligence in Machine Learning Master of Philosophy Master Full Time Mr Quoc Dat Ngo
2025 Co-Supervisor Collecting and analysing real-world network topologies for novel algorithm application. Master of Philosophy Master Full Time Mr Benjamin Jack Lang
2025 Principal Supervisor Quantum Error Correction in Quantum Network Simulations Master of Philosophy Master Part Time Mr Md Samir Khan
2024 Principal Supervisor Understanding and enhancing the robustness of machine learning models for cyber security applications Doctor of Philosophy Doctorate Full Time Miss Yingxin Xu
2024 Principal Supervisor Understanding and enhancing the robustness of machine learning models for cyber security applications Doctor of Philosophy Doctorate Full Time Miss Yingxin Xu
2022 Principal Supervisor Scalable Hypergame models and solutions for Autonomous Cyber Operations. Doctor of Philosophy Doctorate Full Time Mr Quang Huy Ngo
2022 Principal Supervisor Characterising Cyber Environments and Assets using Graph Modelling and Machine Learning Doctor of Philosophy Doctorate Part Time Mr Ben Luo
2022 Principal Supervisor Characterising Cyber Environments and Assets using Graph Modelling and Machine Learning Doctor of Philosophy Doctorate Part Time Mr Ben Luo
2022 Principal Supervisor Scalable Hypergame models and solutions for Autonomous Cyber Operations. Doctor of Philosophy Doctorate Full Time Mr Quang Huy Ngo
2021 Principal Supervisor Hannan Consistent Countermeasures Against Non-Stationary Adversarial Attacks on Autonomous Cyber Operations Doctor of Philosophy Doctorate Full Time Mr Nhat Dao Anh Nguyen
2021 Principal Supervisor Hannan Consistent Countermeasures Against Non-Stationary Adversarial Attacks on Autonomous Cyber Operations Doctor of Philosophy Doctorate Full Time Mr Nhat Dao Anh Nguyen

Date Role Research Topic Program Degree Type Student Load Student Name
2023 - 2025 Principal Supervisor High-Order Graph Models and their Applications in Active Directory Security Master of Philosophy Master Full Time Mr Nhu Long Nguyen
2023 - 2025 Principal Supervisor Algorithms and Graph Models for the Mitigation of Identity Snowball Attacks Doctor of Philosophy Doctorate Full Time Ms Yumeng Zhang
2021 - 2024 Principal Supervisor Analysis of New Methods for Inference in Markov Decision Processes Master of Philosophy Master Full Time Mr Blake Edward Donnelly
2021 - 2025 Co-Supervisor Redesigning Anatomical Pathology Workflow via Machine Learning and Optimisation Doctor of Philosophy Master Full Time Mr Jialiang Li
2017 - 2024 Principal Supervisor Quality of Information in Mobile Ad hoc Networks Doctor of Philosophy Doctorate Full Time Mr Ameer Shakayb Arsalaan
2015 - 2018 Co-Supervisor Adaptive Reinforcement Learning for Heterogeneous Network Selection Doctor of Philosophy Doctorate Full Time Mr Duong Duc Nguyen
2015 - 2018 Co-Supervisor Community Detection in Complex Networks Doctor of Philosophy Doctorate Full Time Mr Ba Dung Le

Date Role Membership Country
2004 - ongoing Member IEEE -
2004 - ongoing Member Association for Computing Machinery (ACM) -

Connect With Me

External Profiles