Intro

Hello! My name is Jeff Schwartzentruber and welcome to my corner of the web. I built this website to showcase my work in the fields of cyber security, machine learning, data analytics, engineering and optimization. Over the past 15 years, my academic research and professional experiences have been centered on machine learning for security, threat intelligence, process optimization, algorithm development and predictive analytics.

I completed my PhD in Mechanical Engineering in 2018 with a focus on process optimization, I am now pivoting my talents to security and business intelligence. The exponential rise in Big Data has driven a data science revolution, which I believe will revolve around the security, business, technology and financial sectors. I see many untapped opportunities for machine learning in security and business applications, and am excited to share and continue my work. Speaking of that, don’t forget to check out my awesome work!

Work

Summary

Although my interests are vast, a large part of my portfolio is focused on cyber security, machine learning, predictive analytics, statistical analysis and process optimization. With that being said, I have compiled a list of my favorite projects (scroll down). These projects are broad in experiences, and range from statistical analytics on large datasets, coding machine learning solutions for the manufacturing sector and numerical modelling. I am always looking to apply and expand my knowledge in new and innovative applications, so be sure to periodically check out my latest conquests. If anything I have worked on sparks your interest or you would like to know more, feel free to contact me.

Log Abstraction for Information Security

When I speak about ML in cyber security, I typically discuss and contrast the traditional methods of threat detection versus the new methods employed using machine learning algorithms. The traditional static approach to security is to have a large corpus of IoCs (e.g. hashes, ips, etc.) from which you search our current security sources (i.e. NIDS, HIDS, SIEM, etc.). This differs from the dynamic approach which typically looks for anomalous behavior. Both methods are generally mature, but are flawed (in my opinion) on one major underpinning - the need for strict data normalization.

Data normalization is the bane of any security engineer and is exasperated by the industries inability to agree on a common log or event format, with many developing their own standards (i.e. Elastic ECS, Splunk CIM, CEF, etc.). This problem results in the difficult task of correlating events between environments and tools, thus reducing efficacy, visibility and coverage.

With the problem described, I have been working with the Dalhousie NIMS lab to develop methods that circumvent the need for strict log parsing. If ML can identify patterns in network traffic, it can definitely be used to identify and abstract various log characteristics, and in doing so unlocks a new perspective of security analytics. Although automated log parsing via ML is an area of active research, our research described in the following paper: Log Abstraction for Information Security: Heuristics and Reproducibility and presented at the ARES 2021 conference, is scoped to security use cases

This paper is part of a broader research project to develop a novel machine learning approach to security that avoids the need for static analysis and manual log parsing - a pure ML pipeline and methodology for security detection. Feel free to contact me, if you would like to know more.

TPO for HR Operational Intelligence

With my PhD coming to an end I began to ask myself – what’s next? Having spent over a decade in various technical fields, I FINALLY had some semblance of understanding regarding the direction of technology and the ‘state of the art’. In my mind, there was no bigger opportunity than in the field of artificial intelligence. With the explosion of big data and cluster computing, the current opportunities of ML seem endless. Having spent most of my academic and professional career engineering for the optimal process/design, coupled with my experience in algorithm development, it appeared that I was built for building ML platforms for optimization problems.

With that being said, I co-created a startup called Alitheia Technologies Inc, and partnered with friend who has an amazing business and sales acumen – thus creating a multi-disciplinary team that was ready to tackle the upcoming AI revolution. This company is centered on a platform I developed called Tailored Process Optimization (TPO), which can be thought of as the brain child of Lean-Six Sigma, ML and process optimization.

In our first case study, we looked at an HR dataset for a potential client and analyzed attrition. The outcomes of the model were vast, and truly surpassed our expectations. TPO was capable of generating an optimal candidate based on historical data, rank the current employees based on their risk of attrition, and provide strategic recommendations on how to best minimize attrition for high risk employees. The application of TPO is vast, and although my summary is brief, feel free to contact me, if you would like to know more.

Intelligent Nozzle Design using ML

This project was centered on AI design for the manufacturing sector. The objective of this project was to use ML to design the best possible nozzle for abrasive waterjet machining (AWJM). I presented this work at the 23rd International Conference on Waterjetting in Seattle ( Optimized abrasive waterjet nozzle design using genetic algorithms). Due to the very violent nature and complex flow phenomena associated with AWJ’s, nozzle optimization has relied on the classical iterative design process… until now.

This project all started when I read a very interesting paper by Dr. Narayanan et al. called Modelling of abrasive particle energy in water jet machining . In this paper, they present a 1D computational fluid dynamics (CFD) model for predicting abrasive particle velocities within 5% error. For anyone that knows anything about CFD, modelling a 3 phase, supersonic, compressible flow is just about the last thing you want to tackle, let only getting only 5% error. In seeing how revolutionary this model was, I reached out to Dr. Narayanan, who graciously allowed me use of his model. Since I already linked the paper, the rest is pretty much history. In summary, we used evolutionary ML algorithms to develop an optimization program. The output of the program was an optimal nozzle design configurations (i.e. nozzle and orifice diameters, mixing chamber sizes, etc); which generated, on average, a 15% increase in cutting efficiency!

AI Winglet Design

My early academic and professional career was focused on aerospace engineering applications. Ever since receiving my glider and private pilots license in my teens, I was hooked on learning everything I could about the development of flight – plus the title of being an Aerospace Engineering sounded pretty cool!

At the end of my undergraduate career, I had the opportunity to work on a research team that was developing AI design systems for a light aircraft manufacture. My role on the team was to develop an intelligent winglet design module. The objective was to take a generic airfoil and wing shape, and based on the various flight characteristics (i.e. airspeed, angle-of-attack, altitude etc.) of that aircraft, have my expert system design the best possible winglet. Having gone through the frustrating iterative design process in many case projects, I was eager to create something that would make my life easier and produce potentially better designs.

The model worked using MATLAB and an API between a CFD vortex lattice simulator called AVL. The dimensions of the winglet would be generated through my ML program, which was then fed into AVL, which would then output the various lift and drag metrics for that specific wing/winglet configuration. The model would then tune the winglet design to maximize the lift-to-drag ratio. As seen from the before and after photos in the header image, the ML program created considerable design improvements, resulting in a 12% increase in performance.

About

To give a quick bio of myself, I am an Canadian based security engineer, data scientist, developer, and reseacher with a PhD in Mechanical Engineering that focused on process optimization, predictive analytics and statistical analysis. My professional journey has pivoted me to a career in cyber security and various R&D activities. I have been fortunate throughout my career to work with many reputable companies (i.e. Interac, 2Keys, Bank of Canada, MAGNA, Bauer, etc.), which have provided me with opportunities to continually build upon my skillsets while challenging me to push the boundaries of applied research and technology.

For more information on my professional career, feel free to visit my LinkedIn profile.

Below is a list of peer-reviewed publications:

Log Abstraction for Information Security: Heuristics and Reproducibility

Modelling of delamination due to hydraulic shock when piercing anisotropic carbon-fiber laminates using an abrasive waterjet

Prediction of Surface Roughness in Abrasive Waterjet Trimming of Fiber Reinforced Polymer Composites

A Usability Study for Electronic Flight Bag (EFB) Flight Planning Applications on Tablet Devices for Ab-initio Pilots

(Forthcoming) Measurement of abrasive particle velocity and size distribution in high pressure abrasive slurry and water micro-jets using a modified dual disc anemometer

Optimized abrasive waterjet nozzle design using genetic algorithms

Abrasive waterjet micro-piercing of borosilicate glass

Erosive Smoothing of Abrasive Slurry-Jet Micro-machined Channels in Glass, PMMA, and Sintered ceramics: Experiments and Roughness Model

Abrasive waterjet machining of small features in composite materials

Contact

Elements

Text

This is bold and this is strong. This is italic and this is emphasized. This is superscript text and this is subscript text. This is underlined and this is code: for (;;) { ... }. Finally, this is a link.


Heading Level 2

Heading Level 3

Heading Level 4

Heading Level 5
Heading Level 6

Blockquote

Fringilla nisl. Donec accumsan interdum nisi, quis tincidunt felis sagittis eget tempus euismod. Vestibulum ante ipsum primis in faucibus vestibulum. Blandit adipiscing eu felis iaculis volutpat ac adipiscing accumsan faucibus. Vestibulum ante ipsum primis in faucibus lorem ipsum dolor sit amet nullam adipiscing eu felis.

Preformatted

i = 0;

while (!deck.isInOrder()) {
    print 'Iteration ' + i;
    deck.shuffle();
    i++;
}

print 'It took ' + i + ' iterations to sort the deck.';

Lists

Unordered

  • Dolor pulvinar etiam.
  • Sagittis adipiscing.
  • Felis enim feugiat.

Alternate

  • Dolor pulvinar etiam.
  • Sagittis adipiscing.
  • Felis enim feugiat.

Ordered

  1. Dolor pulvinar etiam.
  2. Etiam vel felis viverra.
  3. Felis enim feugiat.
  4. Dolor pulvinar etiam.
  5. Etiam vel felis lorem.
  6. Felis enim et feugiat.

Icons

Actions

Table

Default

Name Description Price
Item One Ante turpis integer aliquet porttitor. 29.99
Item Two Vis ac commodo adipiscing arcu aliquet. 19.99
Item Three Morbi faucibus arcu accumsan lorem. 29.99
Item Four Vitae integer tempus condimentum. 19.99
Item Five Ante turpis integer aliquet porttitor. 29.99
100.00

Alternate

Name Description Price
Item One Ante turpis integer aliquet porttitor. 29.99
Item Two Vis ac commodo adipiscing arcu aliquet. 19.99
Item Three Morbi faucibus arcu accumsan lorem. 29.99
Item Four Vitae integer tempus condimentum. 19.99
Item Five Ante turpis integer aliquet porttitor. 29.99
100.00

Buttons

  • Disabled
  • Disabled

Form