Software-Defined Networking (SDN), SD-WAN
Control-plane protocol fuzzing and topology inference
Network policy analysis and inconsistency detection
Secure container ecosystems and Kubernetes networking
Host-based cryptojacking and malware detection with eBPF
Resilient MEC architecture using SmartNIC
WebAssembly and Serverless security
Blockchain transaction analysis and traffic fingerprinting
Deceptive UI attacks in metaverse environments
LLM (Large Language Model) hallucination and misuse detection
Anonymous communication and traffic obfuscation