Product work, systems thinking, and research evidence
This page is the proof layer: projects, architecture choices, and publications that reinforce the technical areas where I go deep.
What the work proves
The projects here are chosen to show more than implementation speed.
- They show architecture ownership, not just interface polish.
- They show where distributed systems, security, and ML workflows intersect.
- They connect shipped builds to a broader pattern of research and technical depth.
CoLab - Real-time Collaborative Editor
High-performance real-time collaborative text editor with conflict-free synchronization, live presence cursors, and deep versioning built around CRDT principles.
DefenSys - Intelligent Cyber Defense Platform
Full-stack cyber defense platform with real-time threat visualization and containerized IoT simulation for attack-response workflows.
Publications as credibility
5 peer-reviewed publications that reinforce the work in applied AI, security, cloud traffic classification, and systems-oriented research.
DefenSys: An Integrated Platform for Malware Detection and Containerized Attack Simulation using Deep Learning
Cybersecurity research on an integrated platform that combines deep-learning-based malware detection with containerized attack simulation for safe threat analysis workflows.
View publicationCASB Security Analytics for Encrypted SaaS Traffic: A Hybrid Transformer-Based Classification Framework in Enterprise Cloud Ecosystems
Research on enterprise SaaS traffic classification using transformer-based approaches for encrypted cloud environments.
View publicationAdaptive ML Framework for SaaS Traffic Classification in Cloud Ecosystem
Applied ML work focused on cloud traffic classification and practical observability for SaaS ecosystems.
View publicationSmart Health Monitoring and Anomaly Detection Using IoT and AI
IoT and AI research on health monitoring pipelines and anomaly detection in connected systems.
View publicationIntrusion Detection in Network Traffic Using LSTM and Deep Learning
Security research on sequence modeling for intrusion detection in network traffic using LSTM-based methods.
View publication