Pinned Loading
-
Automated-Detection-of-Insider-Threats-in-SOC-Using-SIEM-Data-and-Machine-Learning-Techniques
Automated-Detection-of-Insider-Threats-in-SOC-Using-SIEM-Data-and-Machine-Learning-Techniques PublicExplainable AI insider threat detection system with 100% precision. Isolation Forest + SHAP framework processing 26.2GB multi-modal behavioral data (CERT/TWOS datasets). Designed for SOC analyst wo…
Jupyter Notebook 1
-
Enterprise-Security-Assessment
Enterprise-Security-Assessment PublicA 5,000-word penetration testing report for a client case study, covering full PT lifecycle: reconnaissance, scanning, vulnerability exploitation, and mitigation strategies. Includes screenshots, t…
-
Network-Design-Configuration-and-Emerging-Issues-and-Technology-in-Cloud-Security-Portfolio
Network-Design-Configuration-and-Emerging-Issues-and-Technology-in-Cloud-Security-Portfolio PublicA 3-part portfolio demonstrating network-security skills: subnet/VLAN config, secure remote access, email/FTP/Telnet/SSH setup, and a literature review on emerging network/cloud security issues and…
-
Secure-System-Modeling-Petrinets-NivX
Secure-System-Modeling-Petrinets-NivX PublicFormal modelling and verification of a secure web-based system using Petri Nets. The project focuses on behaviour modelling using Snoopy and formal verification using Charlie, incorporating core se…
If the problem persists, check the GitHub status page or contact support.