My research is dedicated to the intersection of critical infrastructure security, cyber-physical systems (CPS), and the secure integration of Artificial Intelligence (AI). Drawing on 14 years of high-stakes operational planning and leadership, I focus on translating real-world risk management into advanced digital defense strategies.

My goal is to develop and validate trustworthy cybersecurity frameworks for complex, interconnected systems, ensuring both mission-readiness and data privacy

Current Research Focus:

Mitigating Digital Risk Across the Expanding IoT Ecosystem

My most recent work investigates the escalating cybersecurity risks associated with the proliferation of Internet of Things (IoT) devices across consumer and industrial domains. This research identifies core vulnerabilities, such as authentication weaknesses, insecure data transmission, and firmware exploitation, common in systems ranging from medical wearables to SCADA controllers.

Preprint

Current and Recent Research:

My current work is centered on practical applications of my academic studies, translating concepts into analytical research preprints that align with my goal of digital defense and resilience.

(Note: The titles below are hyperlinked to ResearchGate.)

Targeted Research

IoT, SCADA, and Medical Device Security

Investigating security frameworks and resilience strategies for embedded systems and critical infrastructure, including SCADA, Digital Health, and Industrial IoT (IIoT).

AI/ML Security, Trust, and Privacy

Developing trust and privacy assurance models for autonomous and semi-autonomous systems, particularly focusing on secure Machine Learning (ML) pipelines and ethical AI deployment.

Cyber-Physical Systems (CPS) & Trustworthy Agentic Systems

Focusing on the assurance and security of complex systems where computing components control physical processes. This includes AI-driven vulnerability modeling in distributed operational environments.

Home IoT Assurance and Secure Software Engineering

Developing IoT device assurance frameworks and privacy validation tools. Research involves integrating AI-based anomaly detection to enforce policy compliance and mitigate consumer-level risks.

Quantum Computing Security

Exploring emerging secure communication methods, such as Quantum Key Distribution (QKD), to prepare for post-quantum cryptographic challenges in future secure networks.