cyber-security

Stocker @ Hack The Box

Hack the Box walkthrough for an easy linux box Stocker

MonitorsTwo @ Hack The Box

Hack the Box walkthrough for an easy linux box MonitorsTwo

Inject @ Hack The Box

Hack the Box walkthrough for an easy linux box Inject

Blockchain technology for cybersecurity: A text mining literature analysis

Analysis of blockchain vulnerabilities, and insights for secure application design. _(A **Q1** journal publication)_

Asymmetric Encryption Techniques for Data Embedding and Authentication in Fingerprints Using Eigen Space Based Modelling

Theis thesis (M.Sc.) is centered around the fingerprint biometrics.

SecureAuth-SA

An Advance & Highly Secure Authentication System 🔐