Mini SIEM with a confidence-threshold agentic loop. AWS S3 ingest, Lambda processing, Bedrock/Claude Haiku for automated alert classification. SNS alerting on low-confidence findings.
Conversational wellness system with hybrid structured/NLP input. Containerized Qwen 2.5 Instruct for personalized health recommendations. Node.js/Express, MariaDB, Docker Compose.
Three SaaS modules for police department operations via Agile/GitHub Projects. Purchase/Repair Request, Leave Management, and LDAP notification service. Full security assessment included.
Offensive security labs simulating real-world attack paths. Nmap, Burp Suite, Metasploit for enumeration, privilege escalation, and web exploitation across Linux and Windows systems.
IEEE-style paper evaluating AES, ECC, ASCON, SPECK, and PRESENT on emulated Z1 motes via Cooja. CPU cycles, power, and throughput benchmarked with Energest profiling.
Technical paper analyzing secure mesh networking architectures, tradeoffs, and threat models for IoT and emergency response. Evaluated security, scalability, and resilience in decentralized designs.
CNN-based tile defect detection and PaddleOCR module for factory floor quality control. React frontend, FastAPI backend, Docker deployment on GCP.
Adversarial attack and defense simulations applying MITRE ATLAS/ATT&CK to train students on real-world AI threat modeling and mitigation. FGSM and PGD attacks on MNIST with PyTorch.
Security reviews, vulnerability reports, Windows Active Directory builds, firewall setup, Wireshark analysis, Shijack spoofing, and PKI infrastructure. OWASP Top 10 applied throughout.
Core OS components on ARM64: process scheduling, memory management, and low-level system control. Worked directly with hardware-near abstractions and kernel-level logic.
Federated learning framework for ECG analysis on the PTB-XL dataset. Multimodal data integration with privacy-preserving training across distributed clients.
Automation scripts for student lab validation, one-command environment bootstrapping, and CI-integrated GitHub Actions pipelines for build and container policy checks.
Playbooks to provision and harden Linux lab VMs, enforce SSH configs, and automate multi-node deployments. Reduced environment setup from hours to minutes using idempotent parameterized roles.
Systems-level programs covering processes, threading, sockets, and file I/O. Networking components using TCP/IP and client–server models. C/C++, Linux, POSIX APIs.
Assembly-level programs exploring CPU architecture, instruction pipelines, memory addressing, and register usage. Maps high-level code to hardware execution using x86 and GNU assembler.
Core data structures and algorithms with emphasis on performance, memory usage, and correctness. Algorithmic analysis for time and space tradeoffs using C++ and STL.