My research is dedicated to the intersection of critical infrastructure security, cyber-physical systems (CPS), and the secure integration of Artificial Intelligence (AI). Drawing on 14 years of high-stakes operational planning and leadership, I focus on translating real-world risk management into advanced digital defense strategies.
My goal is to develop and validate trustworthy cybersecurity frameworks for complex, interconnected systems, ensuring both mission-readiness and data privacy
Current Research Focus:
Mitigating Digital Risk Across the Expanding IoT Ecosystem
My most recent work investigates the escalating cybersecurity risks associated with the proliferation of Internet of Things (IoT) devices across consumer and industrial domains. This research identifies core vulnerabilities, such as authentication weaknesses, insecure data transmission, and firmware exploitation, common in systems ranging from medical wearables to SCADA controllers.
Current and Recent Research:
My current work is centered on practical applications of my academic studies, translating concepts into analytical research preprints that align with my goal of digital defense and resilience.
(Note: The titles below are hyperlinked to ResearchGate.)5>
-
Security Architecture Design
Focused on the practical implementation of Zero Trust models (aligned with HIPAA/NIST frameworks) in distributed environments, including the secure configuration of Active Directory, PKI, and GPO hierarchies.
-
EXIF Metadata as a Hidden Threat Vector:
Examines how manipulated EXIF fields enable hidden payload delivery and system compromise, demonstrated notably by the CVE-2021-22204 ExifTool vulnerability. Highlights how un-sanitized metadata, including geolocation and timestamps, often supports adversarial reconnaissance and targeted social engineering. Recommends automated inspection and mandatory metadata sanitization to reduce exposure.
-
Access Control in Modern Cybersecurity:
Examines the inadequacy of traditional perimeter defenses against sophisticated threats in modern cloud and hybrid environments. The paper advocates for a comprehensive defense-in-depth strategy that integrates foundational controls (ACLs, VPNs) with contemporary frameworks like Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE). It highlights the crucial role of Multi-Factor Authentication (MFA) and Single Sign-On (SSO) in enhancing organizational resilience and strictly enforcing the principle of least privilege.
-
Evolving Cyber Threats and Strategic Defense:
Analyzes contemporary, high-impact threats, focusing on the misuse of compromised credentials, the acceleration of cybercrime through CaaS (Cybercrime-as-a-Service), and the strategic adoption of AI by threat actors. The paper dissects the mechanisms of these threats and maps effective, proactive countermeasures rooted in established security frameworks like the NIST Cybersecurity Framework 2.0. It argues for intelligence-driven, adaptive defense strategies to maintain operational integrity in complex digital environments.
Targeted Research
IoT, SCADA, and Medical Device Security
Investigating security frameworks and resilience strategies for embedded systems and critical infrastructure, including SCADA, Digital Health, and Industrial IoT (IIoT).
AI/ML Security, Trust, and Privacy
Developing trust and privacy assurance models for autonomous and semi-autonomous systems, particularly focusing on secure Machine Learning (ML) pipelines and ethical AI deployment.
Cyber-Physical Systems (CPS) & Trustworthy Agentic Systems
Focusing on the assurance and security of complex systems where computing components control physical processes. This includes AI-driven vulnerability modeling in distributed operational environments.
Home IoT Assurance and Secure Software Engineering
Developing IoT device assurance frameworks and privacy validation tools. Research involves integrating AI-based anomaly detection to enforce policy compliance and mitigate consumer-level risks.
Quantum Computing Security
Exploring emerging secure communication methods, such as Quantum Key Distribution (QKD), to prepare for post-quantum cryptographic challenges in future secure networks.
Focused on the practical implementation of Zero Trust models (aligned with HIPAA/NIST frameworks) in distributed environments, including the secure configuration of Active Directory, PKI, and GPO hierarchies.
Examines how manipulated EXIF fields enable hidden payload delivery and system compromise, demonstrated notably by the CVE-2021-22204 ExifTool vulnerability. Highlights how un-sanitized metadata, including geolocation and timestamps, often supports adversarial reconnaissance and targeted social engineering. Recommends automated inspection and mandatory metadata sanitization to reduce exposure.
Examines the inadequacy of traditional perimeter defenses against sophisticated threats in modern cloud and hybrid environments. The paper advocates for a comprehensive defense-in-depth strategy that integrates foundational controls (ACLs, VPNs) with contemporary frameworks like Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE). It highlights the crucial role of Multi-Factor Authentication (MFA) and Single Sign-On (SSO) in enhancing organizational resilience and strictly enforcing the principle of least privilege.
Analyzes contemporary, high-impact threats, focusing on the misuse of compromised credentials, the acceleration of cybercrime through CaaS (Cybercrime-as-a-Service), and the strategic adoption of AI by threat actors. The paper dissects the mechanisms of these threats and maps effective, proactive countermeasures rooted in established security frameworks like the NIST Cybersecurity Framework 2.0. It argues for intelligence-driven, adaptive defense strategies to maintain operational integrity in complex digital environments.
Targeted Research
IoT, SCADA, and Medical Device Security
Investigating security frameworks and resilience strategies for embedded systems and critical infrastructure, including SCADA, Digital Health, and Industrial IoT (IIoT).
AI/ML Security, Trust, and Privacy
Developing trust and privacy assurance models for autonomous and semi-autonomous systems, particularly focusing on secure Machine Learning (ML) pipelines and ethical AI deployment.
Cyber-Physical Systems (CPS) & Trustworthy Agentic Systems
Focusing on the assurance and security of complex systems where computing components control physical processes. This includes AI-driven vulnerability modeling in distributed operational environments.
Home IoT Assurance and Secure Software Engineering
Developing IoT device assurance frameworks and privacy validation tools. Research involves integrating AI-based anomaly detection to enforce policy compliance and mitigate consumer-level risks.
Quantum Computing Security
Exploring emerging secure communication methods, such as Quantum Key Distribution (QKD), to prepare for post-quantum cryptographic challenges in future secure networks.