Cybersecurity Researcher & Developer

Master's Student | Digital Forensics | AI Security | Immersive Training

I'm Agnieszka (Aga) Sawrasewicz, a graduate student at SIU researching digital evidence, adversarial AI attacks, and building interactive VR/web experiences that make cybersecurity training engaging and practical.

Digital Forensics AI Security VR/WebXR Python Web Development Cryptography Data Analysis
CompTIA Security+ (In Progress) SIU Cybersecurity Research Digital Forensics Tools Certified
0
Projects
0
Tools Mastered
0
Research Areas

Toolkit: WinPmem • FTK Imager • Wireshark • Python • A-Frame • Unity • SHAP/LIME • Autopsy

Mission: Help people learn, defend, and explore safely in the digital era through human-centered security solutions.

View Full Resume
Aga in forest Aga at blue house Aga near pyramid Aga with arms open Aga on balcony

Featured Projects

CyberRanger: National Park Defender

VR & web cybersecurity training game with threat map, missions, and interactive quizzes.

Blue/Red Team · Threat Intelligence · Mission-Based Learning

Visit Site

Human-Centered Cybersecurity Framework

Animated visualization of behavioral learning, co-learning AI, and immersive simulation integration.

Research Framework · Behavioral Learning · AI Co-Learning

View Animation

Forensics Tracker

Professional digital forensics modules for RAM capture, USB imaging, and comprehensive reporting.

Evidence Collection · Chain of Custody · Professional Reports

Enter Tracker

Forensics Quiz Game

Interactive quiz covering digital forensics chapters 1-5 with flashcards and score tracking.

Study Tool · Gamified Learning · Progress Tracking

Play Quiz

Special-Character Adversarial Attacks

Forensic analysis of Unicode and encoding manipulations in large language models.

AI Security · Unicode Exploitation · LLM Vulnerabilities

Open Analysis

P2P Networking & Cybersecurity

Educational visualization explaining P2P evolution from Napster to blockchain networks.

Distributed Systems · Network Security · Blockchain

Explore P2P

Network Utilization: Queueing Theory

Interactive quiz and visualization for understanding arrival rates, service rates, and network congestion.

Advanced Networking · Queueing Models · Performance Analysis

Learn Queueing

Cryptocurrency & Blockchain Forensics

Interactive flow diagram showing how investigators trace stolen digital funds across blockchains.

Blockchain Analysis · Cryptocurrency Tracing · Law Enforcement

Trace Funds

PGP Encryption Flow

Interactive demonstration of Pretty Good Privacy encryption and decryption processes.

Cryptography · Public Key Infrastructure · Secure Communication

Try Demo

Hacker Room 3D

Virtual hacker workspace rendered entirely in the browser with retro monitors and desk setup.

WebGL · 3D Modeling · Browser-Based VR

Enter Room

About Me

Beyond research and code, I'm guided by curiosity and creativity. I love combining nature with technology — hiking forests one day, shaping VR worlds the next. My approach to cybersecurity is human-centered, believing that the best security comes from understanding people, not just technology.

My long-term goal is to design tools and training experiences that help people learn, defend, and explore safely in the digital age, making complex security concepts accessible and engaging for everyone.

Explore My Journey

Let's Connect

Open to internships, research collaborations, and junior roles in cybersecurity, digital forensics, or AI security.

📱

Phone

312-877-1600
🎓

Institution

Southern Illinois University
Master's in Cybersecurity