Thoughts, stories and experiences

Teaching

Research trends and topics for students

For UIT students: If you are interested in working with me on one of all topics as following (for capstone project, thesis or research), please feel free to contact and share me your ideas via email hoant@uit.edu.vn. We can arrange a time to meet (online or offline) and discuss furthermore afterward.

R1 – Network Virtualization, Microservices, and Serverless Computing

  • Virtualization/Containerization and Microservices:
    • Container-based application and microservices deployment, management, monitoring and optimization (Docker, Traefik, Prometheus, Grafana, …)
    • Container orchestration and OS platform for Cloud-Edge, Serverless computing (Kubernetes, Rancher, k3s)
  • Serverless Computing:
    • Open-source platform: OpenFaaS, OpenWhisk
    • Vendor lock-in: Amazon Lambda, Azure Functions
  • DevSecOps

Nice if you have (optional):

  • Grades of at least 7.0 in IT005, IT007, NT132 or good background in computer networks, Linux OS
  • Experience with virtualization and containerization, for example, VMWare; Docker; Kubernetes; Rancher; Traefik or another platform here is a plus
  • Experience with following languages: Golang; Python 3; NodeJS is a plus
  • Experience with Serverless platform (OpenFaaS, OpenWhisk or AWS Lambda, Azure Functions) is a plus

References

  1. Shafiei, H., Khonsari, A., & Mousavi, P. (2020). Serverless Computing: A Survey of Opportunities, Challenges and Applications.
  2. U. Zdun, E. Wittern and P. Leitner, “Emerging Trends, Challenges, and Experiences in DevOps and Microservice APIs,” in IEEE Software, vol. 37, no. 1, pp. 87-91, Jan.-Feb. 2020.
  3. A. Sill, “The Design and Architecture of Microservices,” in IEEE Cloud Computing, vol. 3, no. 5, pp. 76-80, Sept.-Oct. 2016.
  4. D. S. Linthicum, “Practical Use of Microservices in Moving Workloads to the Cloud,” in IEEE Cloud Computing, vol. 3, no. 5, pp. 6-9, Sept.-Oct. 2016.
  5. A. Balalaie, A. Heydarnoori and P. Jamshidi, “Microservices Architecture Enables DevOps: Migration to a Cloud-Native Architecture,” in IEEE Software, vol. 33, no. 3, pp. 42-52, May-June 2016.
  6. Ian Miell, Aiden Hobson Sayers (2019), Docker in Practice (Book)

R2 – Cloud-Edge/Fog Computing, Software-Defined and Networks Intelligence

  • Multi-Access Edge Computing
    • Application for Mobile Edge computing (Android, iOS)
    • Computation Offloading and Scheduling
    • Mobility Management and Resource Allocation
  • Next-gen Software-Defined Network (not available now)
    • P4 programming
    • Stratum, OpenDaylight, ONOS, Ryu Controller
    • SDN Testbed
  • Learning-based (Machine Learning, Deep Learning) for networks (not available now)
    • Traffic generation and zero-attack detection with Generative Adversarial Networks
    • ML/DL networks applications

Nice if you have (optional):

  • Grades of at least 7.0 in IT005, IT007, NT132 or good background in computer networks, Linux OS, mathematical
  • Experience with Cloud-Edge computing, Software-defined Networks, virtualization, and containerization is a plus
  • Experience with following languages: Golang; Python 3; NodeJS; P4; Kotlin/Java or Swift is a plus

References

  1. P. Mach and Z. Becvar, “Mobile Edge Computing: A Survey on Architecture and Computation Offloading,” in IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1628-1656, thirdquarter 2017.
  2. Y. Mao, C. You, J. Zhang, K. Huang and K. B. Letaief, “A Survey on Mobile Edge Computing: The Communication Perspective,” in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322-2358, Fourthquarter 2017.
  3. C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow and P. A. Polakos, “A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges,” in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 416-464, Firstquarter 2018.

R3 – Cybersecurity

  • Web and data privacy
  • Network Attacks detection
  • Microservices/Container security
  • Edge-Cloud computing security

Nice if you have (optional):

  • Grades of at least 7.0 in IT005, IT007, NT101, NT219 or good background in computer networks, Linux OS, information security, cryptography
  • Understanding of OWASP Top 10 is a plus
  • Experience with CEH, CTF, penetration testing is a plus
  • Experience with following languages: Golang; Python 3, Bash is a plus

References

  1. T. Bujlow, V. Carela-Español, J. Solé-Pareta and P. Barlet-Ros, “A Survey on Web Tracking: Mechanisms, Implications, and Defenses,” in Proceedings of the IEEE, vol. 105, no. 8, pp. 1476-1510, Aug. 2017.
  2. Lin, Zilong, Yong Shi, and Zhi Xue. “IDSGAN: Generative adversarial networks for attack generation against intrusion detection.” arXiv preprint arXiv:1809.02077 (2018).
  3. Yilmaz, I., & Masum, R. (2019). Expansion of cyber attack data from unbalanced datasets using generative techniquesarXiv preprint arXiv:1912.04549.
  4. S. Sultan, I. Ahmad and T. Dimitriou, “Container Security: Issues, Challenges, and the Road Ahead,” in IEEE Access, vol. 7, pp. 52976-52996, 2019.

Note: I am currently focusing on topics in terms of DevSecOps; Microservices, Serverless, and Cloud-Edge computing as well as their security problems

General Requirements

These are some key requirements for all of my students:

  1. Good background knowledge in the selected subject area
  2. Have passion and be curious to learn and explore new things – stay abreast of the cutting-edge technologies trends
  3. Responsibility, prioritize and always try to complete the project with the best effort
  4. Good teamwork and proactive problem-solving skill, self-study ability
  5. Good programming skill is a plus!

I want you to succeed, success means “learn with the best effort“, not only get a good grade or just enough to pass!

About author

always try to be better

Leave a Reply

Your email address will not be published. Required fields are marked *