- Associate Professor– Present
- Deputy Programme Director, SIT BEng (Hons) Information and Communications Technology (Information Security)–
- PhD (Computer Science)Nanyang Technological University , Singapore
- MSc (Computer Science)University of Manchester, England , United Kingdom
- MSc (Electrical Engineering)National University of Singapore , Singapore
- BEng Hons (Electrical Engineering)National University of Singapore , Singapore
- International Conference on Internet Monitoring and Protection Best Paper Award
- NTU Postgraduate Scholarship–
- Public Service Commission Merit Scholarship–
- Professional Engineer, PEng SingaporeProfessional Engineers Board, Singapore
- Chartered Information Technology Professional, CITP United KingdomBritish Computer Society
- Chartered Engineer, CEng United KingdomEngineering Council, UK
- SrMIEEE, Institute of Electrical and Electronic Engineers– Present
- MIES, Institute of Engineers, Singapore– Present
- MBCS, British Computer Society– Present
- MSCS, Singapore Computer Society– Present
- MIEEE, Institute of Electrical and Electronic Engineers–
- Principal Research Scientist–
- Senior Engineer–
- Defence Engineering and Scientific Officer–
- Computer Programmer–
Information and Cyber Security
- Smart Learning Analytics for Digital Crime– Present
Principal Investigator-IHL, SLADE: Smart Learning Analytics for Digital Crime, S$3,092,795.00, National Cybersecurity Research & Development (NCR) Programme 2018, Funded by NRF and EDB, 1 April 2020 – 31 March 2022.
- A Cross-Platform, Smart Drone Control Framework– Present
Principal Investigator, A Cross-Platform, Smart Drone Control Framework, S$332,886, MOE Translational R&D and Innovation Fund, 2 Nov 2020 - 1 Nov 2022.
- Application Security Assessment Protocol– Present
Co-Principal Investigator, Application Security Assessment Protocol, S$177,872.00, Singapore Cybersecurity Consortium Seed Grant, 3 February 2020 – 2 May 2021.
- CELLS - A Cross-Platform, Real-Time Security Framework for IoT Endpoints–
S$268,250, MOE-TIF, 3 July 2017 - 3 July 2019
- Principal Investigator, Research & Development in Mobile Phone Security–
S$180,956.00, 2011 – 2013
- Principal Investigator, Malware Analysis and Classification System–
S$180,366.00, 2011 – 2013
- Principal Investigator, Black-Box Web Application Vulnerability Scanning–
S$197,439.00, 2011 – 2013
- Programme Manager, Management and Development of Computer Security Programme–
S$350,000.00, 2011 – 2013
- Programme Manager, Software Code Protection Techniques–
S$318,633.33, 2010 – 2014
- Programme Manager, Auditing Input Validation from Assembly Code for Security Defence, Verification and Testing–
S$430,045.82, Jan 2010 – Dec 2013
- Programme Manager, Management and Development of Software Security Program–
S$350,000.00, Aug 2009 – July 2011
- Principal Investigator, Research & Consultancy in Mobile Platform Security–
S$194,000.00, Aug 2009 – July 2011
- Principal Investigator, Set-up of Computer Security Lab–
S$198,200.00, May 2009– May 2010
- Principal Investigator, A Rule-Based System for Program Analysis–
S$241,583.15, June 2007 – June 2011
- Principal Investigator, A Fault-Tolerant Variable Architecture Parallel Computing Platform–
S$230,000, ACRF Tier 1, October 1994 - June 1999
X. Zhao, C.S. Veerappan, P. Loh, and C. Wee, “Towards Cross-platform Detection of Cyber-Attacks Using Micro-agents”, International Journal of Cyber-Security and Digital Forensics, pp 108-119, Vol. 8, Issue 2, June 2019.
H.T. Le, P.K.K. Loh, and C.T. Lau, “Performance Evaluation of Cyber Reconnaissance Tools”, International Journal of Information Privacy, Security & Integrity, 2016.
P.K.K. Loh, C. T. Lau and B.H. Chan, “Intelligent Widget Reconfiguration for Mobile Phones'', Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 9, pp 413-426, Sept 2011.
P.K.K. Loh and D. Subramanian, “Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting”, IEEE Transactions on Information Forensics and Security, Vol. 5, No 4, pp 613-624, Dec 2010.
P.K.K. Loh and Yi Pan, “An Energy-Aware Clustering Approach for Wireless Sensor Networks”, Intl Journal of Communications, Network and System Sciences, Vol. 2, No. 2, pp 131-141, May 2009.
D. Subramanian, H.T. Le and P.K.K. Loh, “Assuring Quality in Vulnerability Reports for Security Risk Analysis”, International Journal on Advances in Security, Vol. 2, No. 2 & 3, pp 226 – 241, Nov 2009.
P. K. K. Loh and Edmond C. Prakash, “Novel Moving Target Search Algorithms for Computer Gaming'', ACM Computers in Entertainment, Vol. 7, Issue 2, June 2009.
P.K.K. Loh, Yi Pan and W.J. Hsu, ''Performance Evaluation of Efficient and Reliable Routing Protocols for Fixed-Power Sensor Networks'', IEEE Transactions on Wireless Communications, Vol. 8, Issue 5, pp 2328-2335, May 2009.
Y. Chong, C. Quek and P.K.K. Loh, “A novel neuro-cognitive approach to modeling traffic control and flow based on fuzzy neural techniques'', Expert Systems With Applications, June 2008.
P. K. K. Loh and Edmond C. Prakash, “Performance Simulations of Moving Target Search Algorithms'', International Journal of Computer Games Technology, Sept 2008.
P.K.K.Loh, W.J Hsu and Yi Pan, ''Reliable and Efficient Communications in Sensor Networks'', Journal of Parallel and Distributed Computing, Vol. 67, No. 8, pp 922-934, Aug 2007.
P.K.K.Loh, W.J.Hsu, Yi Pan, ''The Exchanged Hypercube,'' IEEE Transactions on Parallel and Distributed Systems, Vol 16, No. 9, pp. 866-874, Sep 2005.
P.K.K.Loh, W.J.Hsu, ''The Josephus Cube: Analysis of Routing and Fault Tolerance'', Journal of Parallel and Distributed Computing, vol 65, Issue 1, pp. 58-64, 2005.
P.K.K.Loh, W.J.Hsu, ''Fault-Tolerant Routing for Complete Josephus Cubes'', Parallel Computing, 2004, vol 30, no. 9-10, pp. 1151-1167.
P.K.K.Loh, W.J.Hsu, ''Fault Tolerance of Complete Josephus Cubes'', Journal of Systems Architecture, 2003.
P.K.K.Loh, W.J.Hsu and A.Omondi, ''Embedding of Fault-Tolerant Trees in the Josephus Cube'', Australian Comp Science Comms, Vol 24, No. 3, pp. 17-27, February 2002.
P.K.K.Loh, W.J.Hsu, ''Embedding of Fault Tolerant Trees in the Josephus Cube'', Parallel Processing Letters, 2001.
P.K.K.Loh and V.Shaw, ''A genetic-based fault-tolerant routing strategy for multiprocessor networks,'' Future Generation Computer Systems, January 2001, Vol 17, No. 4, pp. 415-423.
P.K.K.Loh, W.J.Hsu, ''The Josephus Cube: A novel interconnection network'', Parallel Computing, 2000, vol 26, pp. 427-453.
P.K.K.Loh, W.J.Hsu, ''Fault-Tolerant Communications on Hypercube-Clusters'', Journal of Interconnection N/ws, 2000, vol 1, no. 4, pp. 315-329.
P.K.K.Loh, H.G.Singh and C.K.Chia, ''Virtual Prototyping of Cellular Phones'', Software Practice & Experience, 1999, vol 29, no.10, pp. 897-929.
P.K.K.Loh, W.T.Cai, ''Effects of Topology and Buffering on a Processor Farm'', Microprocessors and Microsystems, V22, N7, pp. 363-372, Jan 1999.
P.K.K.Loh, W.J. Hsu, ''Dynamic Load Balancing on Multiprocessor Networks'', International Journal of Computer Systems Science and Engineering, Elsevier Science, 1997, vol 12, no. 6, pp. 369-372.
P.K.K.Loh, W.Abdul, ''A Fault Tolerant Communications Switch Prototype,'' Microelectronics and Reliability, Elsevier Science, 1997, vol 37, no. 8, pp. 1193-1196.
P.K.K.Loh, ''Artificial Intelligence Search Techniques as Fault-Tolerant Routing Strategies,'' Parallel Computing, 1996, vol 22, pp. 1127-1147.
P.K.K.Loh, W.J.Hsu, W.T.Cai, N.Sriskanthan, ''How Network Topology Affects Dynamic Load Balancing'', IEEE Parallel & Distributed Technology: Systems & Applications (IEEE Computer Soc), Fall Issue, 1996, pp. 25-35.
P.K.K.Loh, ''Heuristic Fault-Tolerant Routing Strategies for a Multiprocessor Network,'' Microprocessors and Microsystems, 1995, vol 19, no. 10, pp. 591-597.
N.Sriskanthan, P.K.K.Loh, K.H.Lee and Y.C.Chang, ''A Real-time Video Phone System on ISDN/LAN'', IEEE Trans on Consumer Electronics, 1995, vol 41, no. 2, pp. 332-342.
N.Sriskanthan, A.Das, P.K.K.Loh and A.H.Leong, ''An Adaptive Switching Architecture for Multiprocessor Networks,'' Microprocessors and Microsystems, 1994, vol 18, no. 6, pp. 307-314.
Mohammad Shameel bin Mohammad Fadilah, Vivek Balachandran, Peter Loh and Melissa Chua, “DRAT : A Drone Attack Tool for Vulnerability Assessment”, 10th ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 2020.
Z. Tang, P. Loh, F. Tan, and Caleb Wee, “Tackling New or Unexpected Challenges in Project-based Learning: the LEARN Model for Facilitators”, CSEIT 2018, July 2018.
C. Veerappan, P. Loh, Z.Tang, and F. Tan, “Taxonomy on Malware Evasion Countermeasures Techniques”, 4th IEEE World Forum on Internet of Things, Singapore, May 2018.
X. Zhao, C.S. Veerappan, P.K.K. Loh, Z. Tang and F. Tan, “Multi-Agent Cross-Platform Detection of Meltdown and Spectre Attacks”, 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Nov 2018.
P.K.K.Loh, “Cells – A Novel IOT Security Approach”, IEEE TENCON 2016 – Technologies for Smart Nation, November 2016.
H. T. Le and P.K.K. Loh, “Identification of Performance Issues in Contemporary Black-Box Web Application Scanners in SQLI”, 1st International Conference on Computing, Information Systems and Communications (CISCO’12), Singapore, May 2012.
X. Li, P.K.K. Loh and Freddy Tan, “Mechanisms of Polymorphic and Metamorphic Viruses”, Proc. Of European Intelligence and Security Informatics Conference (EISIC), pp 149 – 154, Sept 2011, Athens, Greece.
H.T. Le, and P.K.K. Loh, “Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description”, The 25th International Conference on Advanced Information Networking and Applications (AINA 2011), pp 586 – 592, March 2011, Singapore.
H.T. Le, P.K.K. Loh and W.J. Hsu, “Using Graph Similarity Algorithm to Recognize Vulnerability Property Matching in VPRG Model”, The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4-6 Dec 2010, Singapore.
H.T. Le, D. Subramanian, W.J. Hsu and P. K. K. Loh, “Scoring Web-based Vulnerability Impact using Property-Based Vulnerability Model”, 6th Intl Symposium on Web and Mobile Information Services (WAMIS 2010), pp 431-436, Apr 2010, Perth, Australia.
D. Subramanian, H.T. Le, P.K.K. Loh and A.B. Premkumar, “Quantitative Evaluation of Related Web-based Vulnerabilities”, 4th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI2010), pp 118-125, 9-11 June 2010, Singapore.
D. Subramanian, H.T. Le, P.K.K. Loh and A.B. Premkumar, “An Empirical Vulnerability Remediation Model”, IEEE WCNIS 2010, pp 376-380, June 2010, China.
C D. Subramanian, H.T. Le and P.K.K. Loh, “Fuzzy Heuristic Design For Diagnosis Of Web-Based Vulnerabilities”, 4th International Conference on Internet Monitoring and Protection (ICIMP ’09), pp 103-108, May 2009, Venice, Italy.
N.M. Wardhana, H. Johan, P.K.K. Loh, H.S. Seah and D.W.S. Ong, “Efficient Connection Graph Generation for Waypoints in Virtual Environments'', International Conf. & Sympo. on Computer Games; Animation, Multimedia, IPTV, Edutainment & Security, May 2009.
P.K.K.Loh, R. Bhasker and E.C. Prakash, “Heuristic-Based Learning in Abstraction Moving Target Search'', International Conference & Symposium on Computer Games; Animation, Multimedia, IPTV, Edutainment & Security, May 2009.
H.T. Le, D. Subramanian, W.J. Hsu and P.K.K. Loh, “An Empirical Property-Based Model for Vulnerability Analysis and Evaluation”, IEEE Asia-Pacific Services Computing Conference (APSCC 2009), pp 40-45, Dec 2009, Singapore.
H.T. Le and P.K.K. Loh, “Evaluating AVDL Descriptions for Web Application Vulnerability Analysis”. IEEE International Conference on Intelligence and Security Informatics (ISI 2008), pp 279-281, June 2008, Taipei, Taiwan.
H.T. Le and P.K.K. Loh, “Realizing Web Application Vulnerability Analysis via AVDL”, Proc. 10th Intl Conf on Enterprise Information Systems (ICEIS 2008), pp 259-265, June 2008, Barcelona, Spain.
P.K.K.Loh and H.P. Ranjali, “Study of Moving Target Search Algorithms in Gaming Scenarios'', Intl Conf. & Industry Symposium on Computer Games; Animation, Multimedia, IPTV, Edutainment & Security, 2008.
H.T. Le and P.K.K. Loh, “Unified Approach to Vulnerability Analysis of Web Applications”, Proc. Intl e-Conf on Computer Science 2007 (IeCCS 2007) Part II, Dec 2007.
P.K.K.Loh, ''Localized Metrics vs Broadcasting in Wireless Sensor Networks'', Proc. 14th IEEE International Conference on Networks (ICON’06), Vol. 2, pp 1-5, Sep 2006, Singapore.
P.K.K.Loh, ''A Standalone Printing USB Host Device Prototype'', IEEE Asia Pacific Conference on Circuits and Systems, pp 1915-1918, Dec 2006.
P.K.K.Loh and A. Lee, ''Medical Informatics System with Wireless Sensor Network-enabled for Hospitals'', Intl Conf on Intelligent Sensors, Sensor Networks and Information Processing, Vol. 2005, pp 265-270, Dec 2005, Melbourne, Australia.
X Zhang and P.K.K.Loh, ''A Fault-tolerant Routing Strategy for Fibonacci-class Cubes'', Proc. 10th Asia-Pacific Computer Systems Architecture Conf. (APCSAC 2005), 2005.
P.K.K.Loh, K. Y. Law*, K.Y.Chan, ''A Study of Emerging Game Design and Interaction Methods'', Cybergames 2005: International Workshop on Games Development and Research, 2005.
P.K.K. Loh, S.H. Long and Yi Pan, ''A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks'', Proc. 10th IFIP Intl Conference on Personal Wireless Communications (PWC 2005), pp 19 – 26, Aug 2005, Colmar, France.
C.K.Kwoh, J.M. Hou, P.K.K.Loh, ''HaBDiT: Handy Biological Data Integration Tools'', International Joint Conference of InCoB, AASBi and KSBI (BIOINFO2005), 2005, Pusan, Korea.
P.K.K.Loh and D.Y. H. Let, ''A Cost-Effective Space Sensing Prototype for an Intelligent Refrigerator'', 8th International Conf. on Control, Automation, Robotics and Vision (ICARCV 2004), Vol. 2, pp 798–803, July 2005.
P.K.K.Loh, E.C.Prakash, W.T.Cai, ''Simulating Target Explosions in Metal Wars'', Cybergames 2005, International Workshop on Games Development and Research, 2005.
P.K.K.Loh, S. H. Long and Yi Pan, ''An Efficient and Reliable Routing Protocol for Wireless Sensor Networks'', IEEE 6th Intl Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2005), pp 512-516, June 2005.
P.K.K.Loh and E.C.Tan, ''Digital comparator for non-algorithmic routing'', Proc. 2003 Joint Conference of the Fourth International Conference on Information, Communications & Signal Processing and Fourth Pacific-Rim Conference on Multimedia, Vol. 3, pp 1949-1951, May 2004, Singapore.
P.K.K.Loh, E.C.Prakash, ''Trials and Tribulations of Metal Wars - a Multiplayer Internet Game'', MAAP 2004 Conference, 2004.
P.K.K.Loh, S. Phong*, W.T.Cai, K.Y.Chan, ''Multiplayer Internet Gaming with VRML: A Relook'', International Conference on Advances in Computer Entertainment Technology, 2004.
Loh Sau Meng Kelvin*, E.C.Prakash, K.K.Loh, ''Design and Development of a Peer-To-Peer Online Multiplayer Game Using DirectX and C#'', Proc. of IEEE Tencon 2004, 2004.
P.K.K.Loh and X. Zhang, ''A Fault-Tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree'', Intl Conference on Parallel Processing Workshops (ICPPW ’03), pp 305- , October 2003, Kaosiung, China.
P.K.K.Loh and W.J.Hsu, ''Design of Viable Fault-Tolerant Routing Strategy for Optical-based Grids,'' International Symposium on Parallel and Distributed Processing and Applications (ISPA 2003), Vol 2745, pp 112 - 126, July 2003, Aizu, Japan.
P.K.K.Loh and W.J.Hsu, "A Fault-Tolerant Routing Strategy for Complete Josephus Cubes", Proc. 15th IASTED Parallel and Distributed Computing and Systems (PDCS 2003), Vol. I, November 2003, Marina del Ray, USA.
P.K.K.Loh, W.J.Hsu and A.Omondi, ''Embedding of Fault-Tolerant Trees in the Josephus Cube'', CRPIT ’02 Proc. 7th Asia-Pacific Conference on Computer Systems Architecture, pp 17-27, 2002, Melbourne, Australia.
P.K.K. Loh and W.J. Hsu, ''Fault-tolerant Fuzzy Communications on 3D-Mesh Networks'', 3rd International Conference on Information, Communications & Signal Processing (ICICS 2001), October 2001.
P.K.K.Loh, H. Schröder and W.J.Hsu, ''Fault-Tolerant Routing on Complete Josephus Cubes'', Proceedings of the 6th Australasian Computer Systems Architecture Conference (ACSAC ’01), Vol 23, No. 4, pp. 95-104, 2001, Queensland, Australia.
E.C.Tan and P.K.K.Loh, ''Processor-farm model for parallel computation of fixed-polarity Reed-Muller expansions'', Proc. IEEE Region Ten Conference (TENCON 2000) - Intelligent Systems and Technology for the New Millennium, Vol 2, pp. 1-3, September 2000, Kuala Lumpur, Malaysia.
P.K.K.Loh and W.J.Hsu, ''The Josephus Cube: A Large Family of Hypercubic Interconnection Networks'', Proc. 2nd IASTED International Conference on Parallel and Distributed Computing and Networks, pp. 176-181, December 1998, Brisbane, Australia.
P.K.K.Loh and W.J.Hsu, ''A Viable Optical Bus-Based Interconnection Network'', 2nd Int'l Conf. on Information, Communications & Signal Processing, 1999.
P.K.K.Loh and V.Shaw, ''A Genetic-Based Fault-Tolerant Routing Strategy for Multiprocessor Networks'', 2nd Workshop on Bio-Inspired Solutions to Parallel Processing Problems, April 1999, USA.
P.K.K.Loh and W.J.Hsu, ''A Cost-Effective Fault-Tolerant Router for Hypercube Clusters'', 8th Int'l Symp. on Integrated Circuits, Devices & Systems, Dec 1999.
P.K.K.Loh and W.J.Hsu, ''Fault-Tolerant Load Balancing Via Dynamic Switching'', High Performance Computing Asia Conference, 1998.
P.K.K.Loh and W.J.Hsu, ''Fault-Tolerant Load Balancing Via Dynamic Switching'', Proceedings of the High Performance Computing Conf, Vol 2, pp. 1439-1449, 1998.
P.K.K.Loh and W.J.Hsu, ''Performance Analysis of Fault-Tolerant Interval Routing'', Proc. ISCA 11th International Conf. on Parallel and Distributed Computing Systems, pp. 274-281, September 1998, Chicago-Illinois, USA.
P.K.K.Loh and E.C.Tan, ''Design of A Fuzzy-Logic Router'', Proceedings of IEEE Asia-Pacific Conference on communications and 6th Singapore International Conference on Communications, Vol 2, pp. 575-579, 1998.
P.K.K.Loh, A. Wahab and W.J.Hsu, ''A Grouped Adaptive Packet-Switched Communications Model'', Joint Conference of 4th Asia-Pacific Conference on Communications/6th Int'l Conference on Communication Systems, 1998.
W.T.Cai and P.K.K.Loh, ''Effects of Topology and Buffering on a Communications-Enhanced Processor Farm'', 3rd High Performance Computing Asia Conference (HPC Asia'98), pp. 486-494, 1998.
P.K.K.Loh, Q.Gao*, ''A Platform for the Analysis and Design of Manufacturing Process'', Proceedings 4th International Conf on Control, Automation, Robotics and Vision, Singapore, 1996
P.K.K.Loh and W. J. Hsu, ''Adaptive, Fault-Tolerant, Deadlock-Free and Livelock-Free Interval Routing in Mesh Networks,'' Proc. IEEE 2nd Intl Conf on Algos and Architectures for Parallel Processing, pp 348-355, 1996.
X. Zhao, C.S. Veerappan, and P. Loh, “Real-time, Cross-Platform Detection of New Meltdown and Spectre Attack Variants”, Applied Approach to Privacy and Security for the Internet of Things, accepted 14 Nov 2019.
D. Subramanian and P.K.K. Loh, “Malware Analytics for Social Networking”, Trends and Applications of Serious Gaming and Social Media, pp 71-87, Springer, March 2014.
P.K.K. Loh, Fault-Tolerant Multiprocessor Networks, 28 June 2009, ISBN: 978-3-639-17238-6, VDM Verlag Dr. Muller Aktiengesellschaft & Co. KG.
P.K.K.Loh and A.B.Premkumar, ''Self-Reconfiguration in Adaptive Wireless Sensor Networks,'' Computer Science Research Trends, Chapter 5, pp 151-180, 2008.
P.K.K.Loh and Y. K. Tan, ''A Constrained Multipath Routing Protocol for Wireless Sensor Networks'', LNCS - Embedded and Ubiquitous Computing, Vol 4804, pp 661 – 670, Springer-Verlag, Nov 2007.
P.K.K.Loh, ''A Scalable, Efficient and Reliable Routing Protocol for Wireless Sensor Networks'', LNCS - Ubiquitous Intelligence and Computing, Vol 4159, pp 409-418, Springer-Verlag, Sept 2006.
P.K.K.Loh, W.J.Hsu, ''Design of a Viable Fault-Tolerant Routing Strategy for Optical-Based Grids,'' New Horizons of Parallel/Distributed processing with applications, Ed. M.Guo and L.T. Yang, pp 157-172, Springer, 2005.
X Zhang and P.K.K.Loh, ''A Fault-tolerant Routing Strategy for Fibonacci-class Cubes'', LNCS - Advances in Computer Systems Architecture, Vol 3740, pp 215-228, Springer-Verlag, Oct 2005.
P.K.K.Loh and V.Shaw, ''A Genetic-Based Fault-Tolerant Routing Strategy for Multiprocessor Networks'', LNCS – Parallel and Distributed Processing, Vol 1586, pp 220-229, Springer, 1999.
P.C.Capon, P.K.K.Loh, ''Optimising Processor Farming on a Multiprocessor System'', Parallel and Distributed Processing, Ed. K. Boyanov, 1993, pp. 119-135.
Information and Communications Technology (Information Security), BEng (Hons)
- ICT2204 - Ethical Hacking
- ICT3202 - Malware Analysis and Defense
- ICT1002 - Programming Fundamentals
- ICT1008 - Data Structures and Algorithms
Computing Science, BSc (Hons)
- SIT4023 - Cyber Security Fundamentals 4 (formerly known as Cyber Security 4)
Information and Communications Technology (Software Engineering), BEng (Hons)
- ICT1002 - Programming Fundamentals
- ICT1008 - Data Structures and Algorithms
Aerospace Systems, BEng (Hons)
- SIT3030 - Software Engineering 3S