PhD Scholar & Researcher

Mr. Sawrabh

Doctoral Researcher in Cybersecurity |
UGC NET Qualified

Passionate about advancing cybersecurity research, digital safety, and computer science education. Full-stack developer with expertise in building secure, scalable applications and conducting cutting-edge research in cyber defense mechanisms.

15+
Publications
5+
Years Research
20+
Projects
10+
Conferences

About Me

A multifaceted professional dedicated to cybersecurity excellence

PhD Scholar

Currently pursuing doctoral research in cybersecurity with a focus on advanced threat detection, network security protocols, and secure system architectures. Contributing to academic knowledge through rigorous research and peer-reviewed publications.

UGC NET Qualified

Successfully qualified the prestigious UGC NET examination, demonstrating exceptional competence in computer science and research methodology. Eligible for assistant professorship and committed to shaping the next generation of technology professionals.

Cybersecurity Expert

Specializing in digital safety research, threat intelligence, cryptography, and secure software development. Dedicated to building robust security solutions and educating citizens about digital safety practices in an increasingly connected world.

Computer Science Educator

Passionate about teaching and mentoring students in computer science fundamentals, programming, and cybersecurity. Creating engaging educational content and fostering critical thinking in technology education.

Full Stack Developer

Proficient in building end-to-end web applications with modern frameworks and technologies. Experience in both frontend and backend development, database design, cloud deployment, and creating scalable, secure applications.

Digital Safety Advocate

Committed to empowering citizens with knowledge about digital safety, privacy protection, and secure online practices. Conducting workshops, awareness campaigns, and creating resources for digital literacy.

Research Focus

Exploring cutting-edge topics in cybersecurity and computer science

Network Security

Advanced research in intrusion detection systems, firewall architectures, secure network protocols, zero-trust models, and threat prevention mechanisms. Developing ML-based anomaly detection for enterprise networks.

Cryptography

Investigating post-quantum cryptography, blockchain security, homomorphic encryption, and lightweight cryptographic algorithms for IoT. Focus on developing quantum-resistant security protocols.

AI in Cybersecurity

Leveraging artificial intelligence and machine learning for threat detection, malware classification, phishing prevention, and automated incident response. Developing intelligent security systems.

Malware Analysis

Reverse engineering malware, analyzing advanced persistent threats (APTs), developing behavioral analysis frameworks, and creating detection signatures for emerging malware families.

Cloud Security

Research in secure cloud architectures, multi-tenancy security, data protection in cloud environments, compliance frameworks, and developing secure cloud-native applications.

IoT Security

Addressing security challenges in IoT ecosystems, device authentication, secure firmware updates, privacy-preserving protocols, and building resilient smart device networks.

Technical Expertise

Comprehensive skill set spanning research, development, and security

Cybersecurity Tools
Wireshark Metasploit Burp Suite Nmap Snort IDA Pro OWASP ZAP Kali Linux
Programming Languages
Python JavaScript Java C/C++ SQL PHP Bash R
Web Technologies
React.js Node.js Django Flask Express.js Bootstrap MongoDB PostgreSQL
AI & Machine Learning
TensorFlow PyTorch Scikit-learn Keras NLP Deep Learning Computer Vision
Cloud & DevOps
AWS Azure Docker Kubernetes Git CI/CD Jenkins
Research & Documentation
LaTeX MATLAB Research Methodology Statistical Analysis Technical Writing Data Visualization

Publications

Contributing to the academic community through peer-reviewed research

2025 IEEE Journal Impact Factor: 7.2

Deep Learning Approaches for Advanced Threat Detection in Enterprise Networks

This paper presents a novel deep learning framework utilizing ensemble methods and transfer learning for detecting sophisticated cyber threats in enterprise environments. Achieved 98.7% detection accuracy with minimal false positives through innovative feature engineering and attention mechanisms.

2024 ACM Conference Best Paper Award

Lightweight Post-Quantum Cryptographic Protocols for IoT Device Security

Introduces quantum-resistant cryptographic schemes optimized for resource-constrained IoT devices. Demonstrated 40% reduction in computational overhead while maintaining strong security guarantees against both classical and quantum attacks.

2024 Springer Journal

Behavioral Analysis Framework for APT Detection in Corporate Networks

Comprehensive study utilizing graph-based modeling and temporal analysis for detecting advanced persistent threats. Developed a multi-stage attack prediction system with 95% accuracy in identifying sophisticated attack campaigns.

2024 Elsevier

Privacy-Preserving Machine Learning for Secure Cloud Computing

Proposed a novel framework for training machine learning models on encrypted data in cloud environments using homomorphic encryption and secure multi-party computation. Enabled privacy-preserving analytics without compromising model accuracy.

Latest Insights

Sharing knowledge and perspectives on cybersecurity and technology

February 5, 2026

Zero Trust Architecture: The Future of Enterprise Security

Exploring how zero trust principles are transforming enterprise security postures. Learn about implementation challenges, best practices, and the paradigm shift from perimeter-based to identity-centric security...

Read More
January 28, 2026

AI-Powered Threat Detection: Balancing Innovation and Security

Deep dive into machine learning applications in cybersecurity. Examining the potential benefits of AI-driven security systems while addressing concerns about adversarial attacks and model vulnerabilities...

Read More
January 15, 2026

Preparing for Quantum Computing: Cryptographic Implications

Understanding how quantum computing threatens current cryptographic systems. Explore post-quantum algorithms, migration strategies, and the timeline for transitioning to quantum-resistant security...

Read More
December 20, 2025

Privacy in the Digital Age: Protecting Personal Data

Practical guide for citizens to protect their digital privacy. Covering encryption tools, secure communication, data minimization, and understanding privacy policies in the era of big data...

Read More
December 5, 2025

Secure Coding Practices for Full Stack Developers

Essential security practices for building robust web applications. Learn about input validation, authentication, authorization, secure APIs, and common vulnerabilities to avoid in modern development...

Read More
November 22, 2025

IoT Security Challenges and Solutions

Addressing the growing security concerns in IoT ecosystems. Exploring device authentication, firmware security, network segmentation, and building resilient smart device infrastructures...

Read More

Get In Touch

Let's collaborate on research, projects, or educational initiatives

Phone

+91 8126256006

Location

Graphic era deemed to be, University
Dehradun, India

Availability

Monday - Friday
9:00 AM - 6:00 PM IST