๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽผ Acoustic Analysis

Sound Authentication, Audio Verification, Voice Forensics, Frequency Investigation

Beyond Theory โ€“ Interview with Jill Delaney by Juan Alonso
ica.orgยท9h
๐Ÿ›๏ธPREMIS
HackRF Pro Pre-Order: Frequency Range and RF Performance Improvements, USB-C, TCXO Added
rtl-sdr.comยท22h
๐Ÿ“žWebRTC
Filter smarter: A better way to investigate fraud with Search
fingerprint.comยท1d
๐Ÿ”BitFunnel
CISA is Shrinking: What Does it Mean for Cyber?
darkreading.comยท6h
๐Ÿ›กCybersecurity
The Best Bookshelf Speakers of 2025, Tried & Tested
rollingstone.comยท7h
๐ŸŽงAudio Mastering
Apple AirPods pro 2โ€™s noise cancelling is still so impressive, I couldnโ€™t hear myself type this review
the-independent.comยท7h
๐Ÿ‘‚Psychoacoustics
Deaf and Hard of Hearing WG Meeting - 2025-06-24
youtube.comยท10h
โœ‹Tactile Computing
How to Quantify Risk and Communicate Effectively: Step 4 to TruRiskโ„ข
blog.qualys.comยท9h
๐ŸŽฏThreat Hunting
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiยท1dยท
Discuss: Hacker News
๐Ÿค–Archive Automation
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comยท1d
๐Ÿ’ฟOptical Forensics
Unveiling Insights: 18 Essential Resources for Exploratory Data Analysis (EDA)
dev.toยท17hยท
Discuss: DEV
โ›๏ธArchive Mining
Face-Voice Association for Audiovisual Active Speaker Detection in Egocentric Recordings
arxiv.orgยท1d
๐Ÿ”ŠAcoustic Forensics
Gabrl: Securing Commmuniction
gabrl.comยท1dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Physical Layer Challenge-Response Authentication between Ambient Backscatter Devices
arxiv.orgยท1d
๐Ÿ‘๏ธPerceptual Hashing
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgยท23hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.orgยท1d
๐Ÿง Machine Learning
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท1d
๐Ÿ”ฌArchive Forensics
UltraAD: Fine-Grained Ultrasound Anomaly Classification via Few-Shot CLIP Adaptation
arxiv.orgยท20h
๐Ÿง Machine Learning
Machine Learning Fundamentals: active learning tutorial
dev.toยท8hยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.comยท8h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap