About
No bio available.
Skills & Expertise
No skills added yet.
Research Interests
No research interests added yet.
Connect With Me
Publications (5)
The increasing sophistication of cyber threats necessitates the adoption of advanced, autonomous defense mechanisms. Large Language Models (LLMs) have emerged as a powerful tool for automa...
Phishing remains one of the most persistent threats to organizational cybersecurity. This study presents an automated framework integrating Gophish-based phishing simulations with Microsoft Azure Acti...
Quantum Key Distribution (QKD) protocols, particularly the decoy-state BB84, offer a promising approach to enhancing network security by enabling theoretically unbreakable encryption. Integrating QKD...
This paper proposes a serverless, automated incident response framework tailored for cloud-native environments. The workflow integrates AWS Lambda for EBS snapshot acquisition, Velociraptor for live...
Organizations must implement robust disaster recovery (DR) strategies to ensure business continuity. Traditional DR solutions often rely on manual intervention, leading to delays in recovery and incre...
dd