Research Area

Serverless Adoption - Try adopting serverless framework in our research. We develop and deploy the application in our research project by using automation tools, container technology and microservice in the cloud platform with consistent knowledge and experience. No dedicated server is needed for the application deployment and the research can develop and the application based on the utilization. The resource could be optimized based on the project’s needs.

Skills applied for research: Microservice, Docker, Ansible, Puppet, Microk8s

Network Communication - The knowledge and understanding of telecommunication and networking technologies will be applied to design and implement experiments, simulations, or prototypes. We can utilize our expertise to develop innovative solutions, analyze network performance, or investigate specific aspects of communication protocols. We could develop and utilize network simulation tools or modeling techniques to assess the behavior of complex network systems.

Skills applied for research: Datadog, Nagios, LibreNMS

Data Management and Analytics - Data management is the key element for all kinds of research. We need good and well manage data architecture to store all data and so we could perform the precise data retrieval on providing the useful and valuable statistics and report for all of the research. We are performing our data management and retrieval by using noSQL, relational database and search engine like Elasticsearch. We also consider the scalability, flexibility, efficiency and utilization when designing such kind of data management solution.

Skills applied for research: MariaDB, MongoDB, ELK

Cyber Security Assessment and Advisory - We apply the reliable security framework to ensure confidentiality, integrity and availability of the system and research information. We are professional in providing advisory and consultancy on information security, performing on demand penetration testing, providing security reporting and we could help to deliver the vulnerability scanning and checking. We could also implement the abnormal access information monitoring on notifying related parties on abnormal access or susceptible system attack.

Skills applied for research: Kali Linux, Penetration Test

Cyber Security Monitoring - Tracking and monitoring activities in progress to ensure the system/application is healthy in meeting the objectives and performance goals. We are using different kinds of programming and scripting like shell script/python for monitoring and notifying the useful information to related parties. And we built the status board for quick and easy follow up for the information.

Skills applied for research: Zabbix, Perl, Python, Bash, Powershell