Papers coming soon. Research artifacts are being developed into formal manuscripts as they mature. This page will be updated as papers move into submission and review.

Zero Trust design under operational constraints
Network segmentation strategies for legacy environments
Telemetry-first security architecture (log before you block)
Security education as a validation method (labs as pressure tests)
Academic writing begins after ideas survive contact with reality.
academic_publications.sh
$ ./academic_publications.sh
[~] Drafting manuscripts
[ ] Submitted for review
[ ] Accepted
[ ] Published

Back to Publications • See Industry Publications