QUT offers a diverse range of student topics for Honours, Masters and PhD study. Search to find a topic that interests you or propose your own research topic to a prospective QUT supervisor. You may also ask a prospective supervisor to help you identify or refine a research topic.

Filter by faculty:

Found 10 matching student topics

Displaying 1–10 of 10 results

Addressing security challenges for the industrial internet of things

With the emergence of the Internet of Things (IoT) and Industry 4.0, there is a trend for applying these services and applications to a large-scale industrial area. The IoT paradigm has changed the way of interactions with the things that surround us. In essence, the IoT promises ubiquitous connection to the Internet, turning common objects into connected devices. It is predicted that there will be 50 billion connected devices at the end of the year 2022.Over the last few years, …

Study level
Master of Philosophy, Honours, Vacation research experience scheme
Faculty
Faculty of Science
School
School of Computer Science

Trust in Internet-of-Things with blockchain

Blockchain is an unchangeable, distributed database that provides trust in data once it is stored on the database. However, in Internet-of-Things (IoT), the data is an observation of physical context and is susceptible to noise, drift, or malicious alterations. Sensors may even be decoupled from their intended context by an attacker, which may compromise the blockchain data and its value for guiding decisions.This project aims to develop an innovative approach for pervasive trust in IoT, underpinned by blockchain. The research …

Study level
PhD, Master of Philosophy, Honours, Vacation research experience scheme
Faculty
Faculty of Science
School
School of Computer Science

Unified def-site and use-site security policies for component-based software systems

Securing the information manipulated by computer systems, such as privacy and integrity in social software, is a challenge. Traditional methods to impose limits on the information disclosure, such as access control lists, firewalls, and cryptography, provide no guarantees about information propagation. For instance, cryptography provides no guarantees about the confidentiality of the data are given once it is decrypted.Information flow control (IFC) is the problem of ensuring secure information flow according to specified policies within computer systems. Modern applications are …

Study level
PhD, Master of Philosophy
Faculty
Faculty of Science
School
School of Computer Science

Security analysis of open-source software

Several open-source projects drive modern-day IT applications. However, some open-source projects get compromised by malicious attackers, who include malware to the code to compromise the security of the application users.This project will investigate approaches for securing the open-source software.

Study level
Honours, Vacation research experience scheme
Faculty
Faculty of Science
School
School of Computer Science

Fine-grained software vulnerability detection using deep learning techniques

Software vulnerability is a major threat to the security of software systems. Thus, the successful prediction of security vulnerability is one of the most effective attack mitigation solutions. Existing approaches for software vulnerability detection (SVD) can be classified into static and dynamic methods. Powered by AI capabilities, especially with the advancement of machine learning techniques, current software has been produced with more sophisticated methodologies and components. This has made the automatic vulnerability proneness prediction even more challenging. Recent research efforts …

Study level
PhD, Master of Philosophy
Faculty
Faculty of Science
School
School of Computer Science

Strengthening security for cloud computing applications

In today's digital landscape, applications are increasingly being deployed on cloud platforms, offering benefits such as streamlined management and cost-effectiveness. However, even with the efforts of cloud providers to deliver reliable services, the risk of runtime failures and faults still exists. This project aims to address this challenge by exploring innovative approaches to detect and mitigate errors that occur during the operation of cloud-based applications. By proactively identifying and resolving runtime issues, we can enhance the overall performance, reliability, and …

Study level
Honours, Vacation research experience scheme
Faculty
Faculty of Science
School
School of Computer Science

Cybersecurity for open-source software using machine learning and AI

People are increasingly using open-source software in businesses and industries. These software programs are made by a community of developers and are managed by platforms like PyPI and npm. However, there is a worry about the safety of these programs because hackers add harmful code to compromise security and steal important data. This project explores approaches to detect harmful open-source projects using machine learning and AI.

Study level
Honours, Vacation research experience scheme
Faculty
Faculty of Science
School
School of Computer Science

Financial security and ageing

Dr Kelly Purser is interested in supervising students who wish to undertake research about estate planning, financial security and ageing. Financial security as people age is something that is determined by the whole of life course, not just what people do as they near retirement. It is therefore important to consider the implications of future planning on the life able to be led 'post-retirement'. This includes not only estate planning tools such as wills and enduring documents, but also financial …

Study level
PhD, Master of Philosophy
Faculty
Faculty of Business and Law
School
School of Law
Research centre(s)

Australian Centre for Health Law Research

Cyber-security aspects of battery storage systems

Lithium-ion (Li-ion) batteries are a key energy storage component in various electrical and electronic systems such as mobile phones, electric vehicles and grid storage. A properly designed battery management system (BMS) is crucial to guarantee the safety, reliability, and optimal performance of the battery as well as to interconnect the battery systems with each other and external systems through communication channels. However, security threats of the Li-ion battery systems are often overlooked by BMS developers in the design phase. The …

Study level
PhD, Master of Philosophy
Faculty
Faculty of Engineering
School
School of Electrical Engineering and Robotics
Research centre(s)

Centre for Clean Energy Technologies and Practices

Blockchain-based data governance for enterprise applications

Blockchain technology relies on consensus protocols to establish agreement on the system's state using data. However, existing consensus algorithms primarily focus on verifying adherence to pre-defined rules, which may not fully address the need for consensus among human operators in enterprise settings. To bridge this gap, our project explores the potential of lightweight mechanisms to achieve consensus in such scenarios. By investigating alternative approaches, we aim to develop solutions that enable efficient consensus among human operators, ensuring the success of …

Study level
Vacation research experience scheme
Faculty
Faculty of Science
School
School of Computer Science

Page 1 of 1

Contact us

If you have questions about the best options for you, the application process, your research topic, finding a supervisor or anything else, get in touch with us today.