Security Research Contact
_

Anushka works in cyber-physical security, focused on OT/ICS, embedded systems, and networked autonomous platforms. Her approach treats nature as architecture - biological first principles applied to system design, security, and resilience.

Her research spans offensive security and autonomous systems - adversarial analysis on industrial protocols, RF signal exploitation, and edge-autonomous stacks operating in contested environments.

Her methodology integrates zero-trust and secure-by-design frameworks with threat modelling, digital twin simulation, and penetration testing.

Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.// Prepare. Adapt. Regenerate.//
01Security
Domains
  • OT / ICS / Robotics / Autonomous Systems

    Industrial control systems, PLCs, SCADA, and robotic platforms. Protocol-level research across Modbus, DNP3, and EtherNet/IP. Threat modelling for cyber-physical environments including autonomous vehicles and edge-deployed robotics.

  • Network Security

    Deep packet analysis, network exploitation, and adversarial threat hunting. TCP/IP, DNS, TLS internals. APT behavioural analysis and vulnerability scanning across enterprise and industrial network stacks.

  • Web Application Security

    Application-layer vulnerability research, manual testing, and attack surface mapping. Bug bounty and coordinated disclosure.

Operations
  • Red Teaming

    Adversarial simulation, stealth and evasion, C2 frameworks, persistence mechanisms, lateral movement, and living-off-the-land techniques. The long game.

  • Penetration Testing

    Black box, grey box, and white box engagements across network, web application, and OT/ICS environments. Structured methodology from recon through reporting and remediation.

  • AI in Offensive Security

    Autonomous recon, LLM-assisted exploitation, AI-driven persistence and evasion. Adversarial attacks on ML systems embedded in cyber-physical infrastructure. How AI inference pipelines at the edge of autonomous and industrial platforms reshape the attack surface.

02Research
I Papers
Stochastic Autonomy: Edge AI and the Principle of Emergence
Technical note · DOI 10.5281/zenodo.18702809
19 FEB 2026
Stigmergic Coordination: The Environment as Memory
Technical note · DOI 10.5281/zenodo.18105248
31 DEC 2025
II Essays
Loading posts...
03Contact