Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🚩 CTF
Capture The Flag, Security Challenges, Pwn
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
8042
posts in
10.1
ms
Resource Allocation in Strategic Adversarial Interactions:
Colonel
Blotto
Games and Their Applications in Control Systems
♟️
Game Theory
arxiv.org
·
3d
·
…
A
Taxonomy
of
Cognitive
Security
🔬
Cognitive Science
schneier.com
·
1d
·
schneier.com
·
…
The
Webs
Digital
Locks
Have Never Had a Stronger Opponent
🔒
Runtime Security
blog.pixelmelt.dev
·
2d
·
Hacker News
·
…
Thread by @
WuTao2023
on Thread
Reader
App
🔢
Homomorphic Encryption
threadreaderapp.com
·
3d
·
…
Building
AIP
: An
ATProtocol
Authorization Gateway
🔗
ActivityPub
ngerakines.leaflet.pub
·
1d
·
…
Dummy-Aware
Weighted Attack (
DAWA
): Breaking the Safe Sink in
Dummy
Class Defenses
🛡️
AI Security
arxiv.org
·
1d
·
…
Disguising
Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP
Camouflaging
⚡
Side-Channel Attacks
arxiv.org
·
3d
·
…
A
Systematic
Taxonomy
of Security Vulnerabilities in the OpenClaw AI Agent Framework
🛡️
AI Security
arxiv.org
·
2d
·
…
VulnScout-C
: A Lightweight Transformer for C Code
Vulnerability
Detection
🛡️
Memory Safety
arxiv.org
·
2d
·
…
CL-SEC
: Cross-Layer Semantic Error Correction
Empowered
by Language Models
💬
LLMs
arxiv.org
·
3d
·
…
The First
OpenFOAM
HPC Challenge (
OHC-1
)
🔬
eBPF
arxiv.org
·
2d
·
…
Clawed
and
Dangerous
: Can We Trust Open Agentic Systems?
🎯
AI Agents
arxiv.org
·
3d
·
…
Distributed Predictive Control
Barrier
Functions: Towards Scalable Safety
Certification
in Modular Multi-Agent Systems
🤖
Multi-Agent Systems
arxiv.org
·
1d
·
…
Hierarchical Battery-Aware Game Algorithm for
ISL
Power Allocation in LEO
Mega-Constellations
♟️
Game Theory
arxiv.org
·
1d
·
…
4OPS
: Structural Difficulty Modeling in Integer
Arithmetic
Puzzles
🤖
Large Language Models
arxiv.org
·
6d
·
…
Design and Development of an ML/DL Attack Resistance of
RC-Based
PUF
for IoT Security
⚡
Side-Channel Attacks
arxiv.org
·
1d
·
…
Needle in a
Haystack
: Tracking
UAVs
from Massive Noise in Real-World 5G-A Base Station Data
📡
Observability
arxiv.org
·
1d
·
…
Extending
MONA
in Camera Dropbox:
Reproduction
, Learned Approval, and Design Implications for Reward-Hacking Mitigation
🛡️
AI Security
arxiv.org
·
1d
·
…
Predicting Program
Correctness
By
Ensemble
Semantic Entropy
🤖
Large Language Models
arxiv.org
·
2d
·
…
Wan-R1
:
Verifiable-Reinforcement
Learning for Video Reasoning
🛡️
AI Safety
arxiv.org
·
2d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help