๐ Cybersecurity
Network Security CPS Security Cloud Security AI Security IAM SOC Operations Incident Response SIEM Tools Intrusion Detection (IDS) Threat Intelligence
๐ก๏ธ Vulnerability Assessment & Penetration Testing
Metasploit Nmap Burp Suite Wireshark Nessus OpenVAS Nikto Hydra John the Ripper Aircrack-ng OWASP ZAP K6 Load Testing
๐ Cryptography & Privacy
AES / RSA / PKI Homomorphic Encryption Searchable Encryption Identity-Based Encryption (IBE) Zero-Knowledge Proofs Differential Privacy Privacy-Preserving Storage Scyther (Protocol Verification)
โ๏ธ Cloud & DevOps
Oracle Cloud (OCI) AWS Azure Terraform Docker Kubernetes CI/CD Pipelines Infrastructure as Code (IaC)
๐ง Machine Learning & AI
Scikit-learn Random Forest XGBoost SVM Clustering Anomaly Detection Federated Learning Adversarial ML Deep Learning TensorFlow / PyTorch MATLAB Pandas / NumPy Matplotlib / Seaborn
๐ค LLM & Generative AI
Large Language Models (LLMs) Retrieval-Augmented Generation (RAG) Prompt Engineering Fine-Tuning (LoRA / PEFT) LLM Security & Red Teaming Defensive Architectures for LLMs Vector Databases Hugging Face Transformers
๐งช Simulation & Verification Tools
NS-3 GridPACK HELICS Node-RED Smart Grid Simulation Scyther MATLAB / Simulink Time Sync Models
๐ฅ๏ธ Programming & Scripting
Python C C++ Java JavaScript Bash / Shell HTML / CSS Markdown
โ๏ธ Academic & Technical Writing
LaTeX Overleaf TeXstudio Research Paper Writing Technical Documentation Zotero & Mendeley
๐๏ธ Database & Web
MySQL Oracle DB PostgreSQL RESTful APIs WebSockets