Distributed Cryptographic Ledger Security
Active · OngoingCryptography · Distributed Systems · Cybersecurity
A security system for distributed environments where transaction integrity is guaranteed across both parties. No single participant — regardless of their access level — can silently manipulate or fabricate a valid record. The system is designed to make fraud structurally impossible, not just detectable.
- Prevents unilateral transaction forgery — neither client nor server can fake a valid record alone
- Any tampering on either side of the ledger is automatically detectable by the other
- Resistant to replay attacks, identity spoofing, rollback to previous states, and concurrent fraudulent submissions
- Provides mutual auditability: both parties can independently verify the integrity of the full transaction history
Unpublished. Paper under preparation — methodology details withheld.
Preprocessing Methods in ECG Signal Analysis
Published · 2021Signal Processing · Machine Learning · Healthcare
An undergraduate research survey reviewing a decade of ECG analysis studies, with a focused examination of the preprocessing pipelines used before classification, anomaly detection, and arrhythmia analysis. Preprocessing is shown to be a critical and often underspecified step that significantly impacts model performance.
- Reviewed neural network and machine learning approaches to ECG-based cardiac analysis
- Systematically compared preprocessing strategies (filtering, segmentation, normalization) across studies
- Published at SIU 2021 — the IEEE Signal Processing and Communications Applications Conference
Intrusion Detection in Containerized Environments
Published · 2022Container Security · Microservices · IDS
Microservice containerization introduces unique security challenges due to weaker isolation compared to virtual machines. This work empirically evaluates host-based (syscall monitoring) versus network-based IDS strategies for containerized deployments, providing a principled comparison to guide secure microservice architecture decisions.
- Benchmarked multiple IDS sensor types against containerized workloads
- Analyzed trade-offs between host-based syscall monitoring and network-level traffic analysis
- Published at the IEEE Workshop on Secure and Reliable Microservices and Containers (SRMC 2022)