About
Educator and mentor specializing in Full Stack Development & mobile application development. Passionate about AI Product Applications.
I’m an educator and mentor specializing in Full Stack and mobile application development. I enjoy guiding learners from fundamentals to real-world applications, with a growing passion for building and exploring AI-powered products.
You will not be punished for your anger, you will be punished by your anger.
- Zero Trust Architecture (ZTA) enforces continuous verification with no implicit user or device trust.
- AI enables behavioral analysis by learning normal user activity patterns (login, access, device, application use).
- Deviations from these patterns are detected as anomalies indicating potential security threats.
- Machine learning improves detection accuracy and enables dynamic risk-based access control.
- AI-driven anomaly detection makes Zero Trust systems more adaptive, scalable, and resilient to modern cyber attacks.
- Research Interests
- AI and Cybersecurity

Assistant Professor
Institute: School of Computer Science and Engineering
M.Tech