Home

Security+ certified cybersecurity engineer focused on practical defense.

I am a recent MS Cybersecurity and Networks graduate with around 3+ years of experience working in cybersecurity across internships, SOC operations, project work, and hands on labs. I like to learn by doing and move between building secure networks, simulating attacks, analyzing logs, and writing clear explanations so others can repeat the work.

My background starts in electrical engineering and IoT where I spent a year as a student intern at Peak Power Consultancy building real time EV monitoring on ESP32 and CAN. That grew into intrusion detection for cyber physical power systems and secure energy systems as an undergraduate researcher, which led to three IEEE indexed publications and a regional Research Excellence award.

On the cybersecurity side I run a homelab with Pi hole and Unbound, WireGuard and VPNs, pfSense, Security Onion, Wazuh, phishing simulation, and Active Directory style labs. I stay active on CTF platforms, including BSides Pros v Joes, TryHackMe, and Hack The Box, practice offensive skills with tools like Nmap, Burp Suite, Metasploit, and Caldera, and keep my defensive skills sharp through log analysis and incident response themed labs.

20+
Security projects and labs
DNS firewalls, VPN setups, phishing labs, scripting, and research driven security experiments.
15+
CTFs and challenges
From BSides events and internal CTFs to TryHackMe and Hack The Box style targets.
3
IEEE publications
Cyber physical power system intrusion detection, transformer monitoring, and blockchain for vehicle to grid.
5+
Leadership roles
Graduate councils, student communities, outreach, and orientation work that keeps everything human.

I like roles where I can keep building practical security tools and workflows, tuning detections, and helping teams understand why a finding actually matters. The rest of this portfolio breaks down that story into experience, skills, projects, and proof through certifications and achievements.

Experience & Skills

Engineering, security, and hands on execution.

Experience & leadership
SOC Analyst
Intuit ยท Contract ยท Oct 2024 to Present ยท Connecticut, United States ยท Remote

Supporting 24x7 SOC operations across Splunk, CrowdStrike Falcon EDR/XDR, and Microsoft Defender, with a focus on triage, investigation, threat hunting, containment, and automation.

  • Triaged 10K+ daily alerts across Splunk, CrowdStrike Falcon EDR/XDR, and Microsoft Defender in a 24x7 SOC, maintaining SLA compliance and escalating high severity incidents to Tier 3 and IR teams.
  • Investigated 50+ high risk incidents monthly, including phishing, malware, credential compromise, and lateral movement, through full playbook execution and cross-source event correlation, driving a 20% drop in repeat incidents.
  • Decreased alert noise by 25% by tuning Splunk detection rules and refining CrowdStrike Falcon EDR thresholds, sharpening analyst queue focus on high fidelity threats.
  • Performed proactive threat hunting with MITRE ATT&CK TTP mapping and behavioral analysis, uncovering 8+ unknown threats per quarter, improving detection coverage by 15%, and translating hunt findings into new detection rules.
  • Cut MTTR by 30% through disciplined containment runbook execution, including endpoint isolation, account disablement, and IP blocking across phishing, malware, and credential-based scenarios.
  • Engineered Python and SOAR automation for alert triage, IOC enrichment, and compliance reporting, reclaiming 8 to 10 analyst hours weekly while supporting PCI DSS, GDPR, and SOX compliance requirements.
Graduate leadership, student engagement, and support roles
University of New Haven ยท 2023 to 2025

Combined technical work with leadership and service roles that strengthened my communication, documentation, and community building skills.

  • Served as Vice President of Public Relations for the Graduate Student Council, leading creative marketing, branding, social media, and event documentation for graduate students.
  • Worked as a Campus Connector and Orientation Support staff with the Office of Graduate and International Student Life, helping incoming students with onboarding, campus tours, and resource navigation.
  • Supported the Office of Graduate Admissions as a Graduate Assistant, securing time sensitive application workflows in Slate, verifying academic records, and applying access control and data integrity best practices.
  • Led community outreach for the Indian Student Council and volunteered as an event photographer, supporting large cultural events such as Diwali and helping create a welcoming campus experience.
Cyber Security Analyst
Peak Power Inc ยท Jun 2022 to Jun 2023 ยท Thane, Maharashtra, India ยท On-site

Blended SOC-style monitoring with IoT security engineering on an end-to-end EV monitoring stack, spanning ESP32 telemetry, Flask services, MQTT, and AWS.

  • Monitored and triaged 1,200+ daily alerts across endpoint, network, cloud, identity, and data-access environments using Cisco XDR and Splunk SIEM.
  • Investigated phishing, malware, credential misuse, lateral movement, and abnormal data access by correlating firewall, IDS/IPS, EDR, Active Directory, DNS, and cloud logs.
  • Conducted data-centric incident investigations to identify potential data exposure and insider risk indicators, and documented timelines, impacted assets, and remediation steps.
  • Executed containment actions including endpoint isolation, account disabling, IP/domain blocking, and access control enforcement.
  • Performed proactive threat hunting aligned with MITRE ATT&CK techniques and supported vulnerability management and compliance by validating critical findings and coordinating remediation.
  • Designed an ESP32-based power metering and fault detection circuit using CAN to track voltage, current, temperature, and fault states for EV telemetry.
  • Built and secured a Flask dashboard and API for live EV telemetry using input validation, authentication checks, and safe session handling for internal engineering use.
  • Implemented an LSTM-based battery health model and exposed it via a secure Flask API with anomaly checks and alerts for remote monitoring.
  • Hardened an MQTT and AWS pipeline with TLS, certificate-based device identity, and least-privilege IAM roles for topics, storage, and APIs.
  • Acted as security owner using Nmap, OpenSSL, Burp Suite, and Snort to review services, test for common web vulnerabilities, and define runbooks for login failures, unusual IP ranges, and traffic spikes.
Undergraduate Student Researcher
St. Francis Institute of Technology ยท Part-time ยท May 2022 to Oct 2022 ยท Mumbai, Maharashtra, India ยท On-site

Undergraduate research role focused on applying machine learning and blockchain to cyber physical power systems and secure energy trading, resulting in three IEEE indexed publications at the 2022 Global Energy Conference (GEC) in Batman, Turkey.

  • Co-designed and implemented a machine learning based intrusion detection system for a cyber physical power system using decision trees to detect multiple cyber attack types, evaluated with accuracy, precision, recall, and F1 score.
  • Developed a transformer oil temperature monitoring model from load and operating data, benchmarking kNN, random forest, SVM, and logistic regression and showing kNN as the best classifier for low vs high oil temperature.
  • Contributed to the design and simulation of a PBFT style blockchain framework to secure Vehicle to Grid (V2G) energy trading, focusing on transaction integrity, confidentiality, and privacy.
  • Owned end to end research workflows including literature review, model and system design, dataset preparation, coding and simulation, experiment analysis, and writing camera ready manuscripts accepted and published on IEEE Xplore under author profile โ€œA. Vedant.โ€
Education
MS in Cybersecurity and Networks
University of New Haven ยท GPA 3.83 ยท Aug 2023 to May 2025

Graduate program focused on offensive security, blue team operations, network engineering, and secure systems, with a strong emphasis on labs, projects, and community involvement.

  • Coursework across ethical hacking, cryptography and data security, digital forensics, incident response, Unix and Linux administration, enterprise network design, security architecture, and scripting for automation.
  • Built and maintained homelabs with Pi hole, Unbound, WireGuard, pfSense, Security Onion, Wazuh, phishing simulation, Active Directory style labs, and Python based automation for log parsing, data collection, and attack simulation.
  • Held multiple leadership and service roles including Vice President of Public Relations for the Graduate Student Council, Campus Connector, and community outreach work with the Indian Student Council, strengthening communication and technical storytelling skills.
  • Recognized with the Distinguished Service Award from the Office of Graduate & International Student Life for sustained contributions to the graduate student community.
BE in Electrical Engineering
St Francis Institute of Technology ยท Grade 8.13 ยท Aug 2019 to May 2023

Electrical engineering degree that combined power systems, embedded systems, IoT, and software, and laid the foundation for later work in cyber physical and cybersecurity domains.

  • Coursework in power systems, automation and control, cyberlaw, computer programming, databases, operating systems, artificial intelligence and machine learning, and energy systems, giving a strong technical base across both hardware and software.
  • Worked as an undergraduate researcher on cyber physical power systems and secure energy systems, leading to three IEEE indexed conference papers on intrusion detection, transformer monitoring, and a PBFT blockchain for secure vehicle to grid energy trading.
  • Led and contributed to multiple applied projects, including IoT and automation builds and ML based energy and recommendation systems that connected theory with practical implementations.
  • Awarded first place in the Research Excellence (Undergraduate Student Regional) category at the IEI NMLC FCRIT Excellence Awards 2023, and first place at the Electrical Symposium 2023 for research and project work.
  • Active member of IEEE and the Electrical Engineering Students Association, often helping with technical events, photography, and documentation, and building early experience in presenting technical work to mixed audiences.
Technical skills
Security operations and blue team

Experience reading and correlating logs, working with detection tools, and simulating SOC workflows from alert triage through containment and follow up.

SIEM concepts Security Onion Wazuh Snort / IDS Log analysis Packet capture Wireshark Tcpdump Incident response Phishing analysis NIST basics Disk encryption Network security implementation Security monitoring Linux log forensics
Offensive security and CTF

Use offensive tooling to understand attacker workflows and then translate those paths into better detections, hardening steps, and playbooks.

Nmap Burp Suite Metasploit SQLMap Hydra John / Hashcat Kali Linux Pre attack recon Web app security Credential attacks Privilege escalation basics CTFs & labs Post exploitation scripting
Networking, platforms, and homelab

Build small but realistic environments that mimic enterprise setups and keep everything documented and reproducible.

Linux & RHEL Windows client & server Active Directory Raspberry Pi Pi hole & Unbound WireGuard VPN pfSense & firewalls DHCP & DNS SSH & secure remote access NAS / storage basics VirtualBox VMware Network segmentation basics VPN design Wireless networking
Programming, data, and automation

Use scripting and data analysis to speed up recon, analysis, and reporting, and to support machine learning driven research and tooling.

Python Bash scripting PowerShell C / C++ basics Flask & REST APIs Django basics JavaScript HTML & CSS SQL / MySQL MongoDB NumPy Pandas Scikit learn TensorFlow Streamlit Git & GitHub MATLAB & Simulink
Cloud, IoT, and security fundamentals

Connect cloud services, IoT, and core security principles so that lab work stays aligned with real environments and governance requirements.

AWS basics & IAM MQTT ESP32 microcontrollers IoT security TLS / HTTPS Encryption & cryptography Password management Cybersecurity fundamentals Network security Cyber defense Risk and cyber security risk Research & documentation
Tools, platforms, and extras

Extra tools that show up across projects, labs, and side work, especially when documenting findings or presenting results.

Kali Linux tooling Android & Kotlin basics Node.js sockets Arduino & embedded Photoshop Lightroom Technical writing Teaching & mentoring peers
Projects

Turning lab ideas into usable security tools.

These projects come directly from my GitHub and homelab work. They combine blue team thinking, offensive techniques, research, and clear write ups. GitHub links are provided for all public repositories.

Cloud SOC / Detection Engineering
AzureSOC

Fully automated Cloud SOC lab on Azure with Active Directory, Microsoft Sentinel, Suricata IDS, Sysmon, and MITRE ATT&CK-aligned attack simulation.

Built for practical blue team workflow from deployment to attack simulation, log collection, KQL-based detection, and incident visibility in Microsoft Sentinel.

Azure Microsoft Sentinel KQL Sysmon Suricata Active Directory
See Project โ†—
Security Auditing Automation
Automated-pentest-wrapper

Lightweight bash wrapper for Debian and Kali Linux that automates common security auditing workflows through a simple menu-driven interface.

Bundles recon, web auditing, exploit lookups, wireless auditing, brute force checks, packet inspection, and payload generation into one organized toolkit.

Bash Kali Linux Nmap Nikto Wifite Bettercap
See Project โ†—
Recon Automation
Lazy-recon

Bash-based reconnaissance workflow that automates subdomain enumeration, live host discovery, tech fingerprinting, port scanning, screenshots, crawling, and vuln checks.

Built to speed up repetitive bug bounty and pentest recon by chaining tools like subfinder, httpx, nmap, nuclei, katana, gau, feroxbuster, and gowitness.

Bash subfinder httpx nmap nuclei gowitness
See Project โ†—
Browser Forensics / IR
Chrome-Browser-Data-Footprint-Extractor-Windows

Windows Python tool that inspects local Chrome profiles and exports browser artifacts such as logins, cookies, history, downloads, bookmarks, and extensions for auditing and research.

Demonstrates how Chrome stores local artifacts, how DPAPI protects browser secrets, and how structured exports can support privacy audits, incident response, and forensic education.

Python Windows DPAPI SQLite Forensics
See Project โ†—
Network Security
WireGuard VPN Setup on Raspberry Pi 5

Weekend build where I deployed a WireGuard VPN with Pi hole on a Raspberry Pi 5 to get network wide DNS filtering even when I am off site.

Raspberry Pi Pi hole WireGuard
See Project โ†—
Security Awareness
GoPhish Phishing Simulation Lab

End-to-end GoPhish lab: plan, run, and analyze phishing simulations with templates, cloned landing pages, SMTP setup, and full reporting.

GoPhish SMTP Reporting
See Project โ†—
Network Defense
PiHole Ultimate DNS Firewall

Transformed a Raspberry Pi into an enterprise-grade DNS firewall that eliminates ads, trackers, malware, and telemetry across all devices.

Pi-hole Unbound Firewall
See Project โ†—
SOC Simulation
Cybersecurity Home Lab

Virtualized cybersecurity home lab built on VirtualBox featuring pfSense, Wazuh, MITRE Caldera, Nessus, and Active Directory for red teaming.

Wazuh pfSense Active Directory
See Project โ†—
Malware Analysis
Hidden Keylogger

Techniques for gathering system and network information, capturing user activity (clipboard/keys), and encrypting data using AES.

Python AES Scanner
See Project โ†—
Cryptography
Secure Chat Application

A secure chat application implemented using Python. Uses RSA encryption for secure message exchange between clients and a server.

Python RSA Sockets
See Project โ†—
OS Algorithms
Round Robin Scheduler

Python script that simulates a thread scheduler using round-robin scheduling with priority, providing insights into CPU performance.

Python Algorithms CPU
See Project โ†—
Python Automation
Notification Reminder

Simple Python script for sending customizable desktop notifications. Designed to be flexible and easy to use for alert automation.

Python Automation Scripting
See Project โ†—
Python GUI
Tic-Tac-Toe

A modern implementation of the classic Tic Tac Toe game built with Python and Pygame, featuring custom graphics.

Python Pygame Game Dev
See Project โ†—
Python GUI
Snake Game

Modern take on the classic Snake game, built using Python and Pygame. Features sound effects and a highscore tracking system.

Python Pygame Game Dev
See Project โ†—
Cryptography
End-to-End Encryption

Demonstrates E2EE using Python sockets. Implements x25519 key exchange and AES encryption for secure client-server communication.

Python AES x25519
See Project โ†—
Automation
Bot

Python based bot automation script. Developed for internal testing and task automation purposes.

Python Automation Bot
See Project โ†—
Certifications & Achievements

Learning backed by credentials and impact.

A comprehensive view of my professional certifications, academic honors, competitions, and volunteering leadership that demonstrate continuous learning and community engagement.

Professional Certifications
Splunk: Zero to Power User
Udemy ยท Issued Apr 2026

Hands-on Splunk course focused on search, SPL, dashboards, field extraction, and practical log analysis workflows that support SOC investigation and detection work.

Splunk SPL Log Analysis
Practical Junior Penetration Tester (PJPT)
TCM Security ยท Issued Mar 2026

Hands-on penetration testing certification focused on methodology, enumeration, privilege escalation, documentation, and practical attacker workflow.

Penetration Testing Enumeration Privilege Escalation
Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)
Microsoft ยท Issued Mar 2026

Covers Microsoft security, identity, compliance, Zero Trust, Entra, Defender, Sentinel, Purview, and foundational governance concepts.

Identity Microsoft Security Compliance
Microsoft Certified: Azure Fundamentals (AZ-900)
Microsoft ยท Issued Mar 2026

Covers Azure core services, cloud concepts, architecture, governance, compliance, pricing, and foundational cloud security understanding.

Azure Cloud Governance
ISC2 Certified in Cybersecurity (CC)
ISC2 ยท Issued Sep 2025

Covers security principles, business continuity, access control, operations security, and network security concepts and helps connect technical work with policy and control frameworks.

Security Fundamentals Access Control Operations Security
CompTIA Security+ (SY0-701)
CompTIA ยท Issued Jul 2025

Validates core security skills across network security, identity and access, incident response, risk management, and governance. Served as a foundational step for SOC work and blue team thinking.

Network security Incident response Risk management
industrial-intrusion Certificate
TryHackMe ยท Issued Jul 2025

Hands-on training focused on securing ICS and SCADA systems, understanding OT protocols, and defending critical infrastructure against targeted attacks.

ICS/SCADA OT Security Critical Infrastructure
Mastercard - Cybersecurity Job Simulation
Forage ยท Issued Jun 2025

Completed a job simulation involving phishing analysis, security awareness training, and data protection strategies, mirroring real-world analyst tasks.

Phishing Analysis GRC Security Awareness
Tata Group - Cybersecurity Analyst Job Simulation
Forage ยท Issued Jun 2025

Worked on Identity and Access Management (IAM) strategy, documentation, and integration challenges in a global enterprise environment simulation.

IAM Strategy Consulting
Advent of Cyber 2024 Certificate
TryHackMe ยท Issued Feb 2025

Completed hands-on defensive and offensive cybersecurity challenges across web, network, detection, and practical lab-based security scenarios.

Hands-on Labs Blue Team TryHackMe
2024 Red Hat Academy - Program Learner
Red Hat ยท Issued Aug 2024

Recognition through Red Hat Academy for structured Linux system administration learning with practical exposure to enterprise Linux concepts and tooling.

Red Hat Linux System Administration
Red Hat System Administrator II (RH134)
Red Hat ยท Issued Jun 2024

Focused on enterprise Linux administration topics including services, networking, automation basics, security controls, and practical RHEL management.

RHEL Linux Administration System Services
Red Hat System Administrator I (RH124)
Red Hat ยท Issued May 2024

Built foundational Red Hat Enterprise Linux skills across user management, permissions, command line operations, secure remote access, and Bash usage.

RHEL Bash scripting Linux Fundamentals
Red Hat System Administration
Red Hat Academy ยท Issued 2024

Completed RH124, RH134, and RH294. Focused on RHEL, secure remote access, Bash scripting, SELinux, user and permission management, and network services which I apply directly in lab environments.

RHEL Bash scripting Server hardening
Introduction to Python for Cybersecurity
InfoSEC ยท Issued Dec 2023

Covered Python fundamentals with a cybersecurity lens, supporting automation, scripting, and security-focused problem solving.

Python Cybersecurity Automation
Foundations of Cybersecurity
Google ยท Issued Dec 2023

Introduced structured SOC workflows, SIEM usage, Linux basics, SQL, and core security principles which now back my homelab and CTF work.

SOC fundamentals Linux SQL
Python for Cybersecurity and Ethical Hacking courses
InfoSec, Internshala, Coursera, and university ยท Issued 2020 to 2023

Multiple courses across Python for cybersecurity, ethical hacking, web application security, machine learning, and IoT security that support my scripting and research projects.

Python Ethical hacking Machine learning
MATLAB
MathWorks ยท Issued Jul 2022

Demonstrated foundational MATLAB skills for computation, simulation, and technical problem solving in academic and engineering work.

MATLAB Simulink Technical Computing
Android App Development
Internshala Trainings ยท Issued Nov 2021

Covered Android application development fundamentals including UI design, application structure, and mobile app implementation concepts.

Android Development Mobile Applications App Development
Internship and Job Preparation
Internshala Trainings ยท Issued Oct 2021

Covered workplace readiness, communication, leadership, and career preparation skills that supported early professional development.

Career Development Leadership Communication
Ethical Hacking
Internshala Trainings ยท Issued Sep 2021

Covered core ethical hacking concepts, attacker methodology, and basic security testing approaches that helped build early offensive security fundamentals.

Ethical Hacking Cyber Defense Security Testing
Machine learning and IoT
St. Francis Institute Of Technology ยท Issued Jun 2021

Explored the intersection of machine learning and IoT systems, building foundational understanding that later supported research and security thinking.

Machine Learning IoT Research
Energy Literacy
Energy Swaraj Foundation ยท Issued Jul 2020

Focused on energy awareness, sustainability concepts, and the broader understanding of power systems and responsible energy use.

Energy Sustainability Power Systems
MATLAB Certified
St. Francis Institute Of Technology ยท Issued Jul 2020

Demonstrated foundational MATLAB proficiency for computation, data analysis, and technical problem solving in academic project work.

MATLAB Data Analysis Technical Computing
Python Data Structures
Coursera ยท Issued May 2020

Built foundational understanding of Python data structures, iteration, file handling, and practical programming patterns useful for scripting and automation.

Python Data Structures Programming
Python for Everybody Specialization
Coursera ยท Issued Apr 2020

Covered Python fundamentals, data handling, databases, and programming basics that helped build a long-term foundation for scripting and automation work.

Python Databases Programming Fundamentals
Competitions & CTFs
NSA Codebreaker Challenge
National Security Agency

Solved mission-centric reverse engineering and cryptanalysis challenges involving real-world scenarios to track and neutralize simulated threats.

Reverse Engineering Cryptanalysis Mission-Centric
BSidesNYC 2025 โ€” Pros v Joes CTF
John Jay College (CUNY) ยท Oct 18, 2025

Competed as a Blue Team member in a live SOC simulation. Defended environments against a relentless Red Team by monitoring systems, analyzing logs, patching services, and coordinating defense strategies in a high-pressure scenario.

Blue Team SOC Incident Response
Security BSidesCT CTF
Sacred Heart University ยท Sep 20, 2025

Finished 5th in the "Army of One" bracket and 10th overall with 3,734 points out of 83 players. Solved challenges across various domains using tools and "living off the land" techniques.

Top 10 CTF Solo
TryHackMe Industrial Intrusion CTF
Jun 2025

Ranked 278th out of 3,000+ active teams with 472.5 points. Focused on ICS enumeration, web API exploration, Node-RED exploitation, and Modbus/PLC tasks.

ICS/OT Node-RED Modbus
CBC Community of Practice CTF
NCCoE ยท May 2025

Secured 7th place with 1300 points out of 41 active players. Challenges covered Forensics, OSINT, Steganography, Cryptography, and Reverse Engineering.

7th Place Crypto Forensics
CIT CTF 2025
University of New Haven ยท Apr 2025

Team "CTF Chargers" secured 136th spot out of 950 competing teams. Personally earned 9,720 points tackling Reverse Engineering, Web Exploitation, and Forensics challenges.

Reverse Engineering Web Exp
JerseyCTF V 2025
NJIT ยท Mar 2025

Secured 54th place out of 400+ teams in a 24-hour Jeopardy-style competition. Leveraged Ghidra, CyberChef, and Python scripting to automate flag hunting and solve binary exploitation tasks.

Top 15% Binary Exp Scripting
Jigsaw Phishing Quiz
Google Jigsaw ยท 2025

Achieved a perfect score of 10/10 in Google Jigsaw's advanced phishing quiz, demonstrating strong phishing recognition and social engineering awareness.

10/10 Score Phishing Awareness
Volunteering & Leadership
Vice President of Public Relations
Graduate Student Council, UNH ยท Sep 2024 - Present
  • Creative Marketing: Designing flyers and branding materials for campus events.
  • Social Media: Managing accounts to ensure consistent engagement and presence.
  • Event Documentation: Photographing key GSC and OGISL events.
  • Outreach: Conducting interviews to highlight student and faculty stories.
Campus Connector
University of New Haven ยท Aug 2024 - Dec 2024
  • Facilitated onboarding for incoming graduate and international students.
  • Led campus tours and informational sessions to improve student retention.
  • Provided guidance on academic resources and cultural integration.
Head of Community Outreach
Indian Student Council ยท Jan 2024 - Jan 2025
  • Led recruitment efforts using digital tools like QR codes for seamless sign-ups.
  • Collaborated with council members to support diversity initiatives.
  • Managed member feedback and attendance tracking for large-scale events.
Event Photographer
Indian Student Council ยท Nov 2023
  • Documented the major Diwali event, capturing performances and activities.
  • Assisted with event logistics and setup to ensure smooth execution.
  • Collaborated with the team to create a welcoming festive atmosphere.
Publications
Detecting Cyber Attacks in a Cyber physical Power System: A Machine Learning Based Approach
IEEE ยท Dec 2022

Proposed and evaluated a machine learning based intrusion detection approach for cyber physical power systems by comparing classifiers on accuracy, precision, recall, and F1 score against attack scenarios.

View Publication โ†—
A Machine Learning Approach to Transformer Oil Temperature Monitoring Using Load Analysis
IEEE ยท Dec 2022

Used machine learning models to predict transformer oil temperature based on load conditions to help utilities detect faults early and maintain reliability.

View Publication โ†—
A Practical Byzantine Fault Tolerance Blockchain for Securing Vehicle to Grid Energy Trading
IEEE ยท Dec 2022

Explored a blockchain approach to secure communication and transactions between electric vehicles and the grid using a practical Byzantine fault tolerant style architecture.

View Publication โ†—