Focused on cybersecurity and network defense. Proficient in C and Python with hands-on experience in penetration testing, embedded systems, and networking fundamentals. Interested in network security and pentesting.
Developed the network architecture and communication protocols for a multi-agent system designed to manage crisis situations. Enables autonomous agents to coordinate and share information effectively, improving response times and decision-making during emergencies.
A Python-based REST API that checks the reputation of IP addresses using the AbuseIPDB service. Returns a structured JSON response with reputation score and threat metadata.
An ethical Arduino Nano device that captures an IR remote signal and replays it on button press. Demonstrates embedded systems design, signal capture, and microcontroller programming.
A command-line tool that encrypts and decrypts messages using 3 layers of encryption — VPN, TLS, and AES256 — for secure transmission over untrusted networks.
Simulated the QLEACH-EAS protocol — an energy-aware, QoS-enhanced clustering algorithm for wireless sensor networks. Investigates routing efficiency, energy consumption, and network lifetime optimization in resource-constrained IoT environments.
DOI: 10.13140/RG.2.2.36348.09607