Automated Artifact Detection & Classification in Microscopy Image Datasets
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„Document Digitization
How we trained an ML model to detect DLL hijacking
securelist.comยท21m
๐Ÿ”—Binary Similarity
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท16hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
AKF: A modern synthesis framework for building datasets in digital forensics
sciencedirect.comยท1d
๐Ÿ”FLAC Forensics
Tape Library and Show Off
i.redd.itยท9hยท
Discuss: r/homelab
๐Ÿ“ผCassette Archaeology
200+ hours processing 33,891 legal documents with AI - DOJ transparency vs one engineer
medium.comยท10h
๐Ÿค–Archive Automation
Detecting Notational Errors in Digital Music Scores
arxiv.orgยท4h
๐ŸŽผComputational Musicology
Optimizing a QuickTake Image Decoder for the Apple IIโ€™s 6502
hackaday.comยท15h
๐ŸŽApple II Heritage
Nix pills
nixos.orgยท23h
โ„๏ธNixpkgs
Mastering Google Dorking: Discovering Website Vulnerabilities
infosecwriteups.comยท1d
๐Ÿ”“Hacking
AI in Digital Forensics: a Tool, not an Oracle
blog.elcomsoft.comยท3d
๐Ÿ‘‚Audio Evidence
What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.euยท4d
๐Ÿ”NTLM Forensics
Ryan Baker
deprogrammaticaipsum.comยท5h
๐ŸงฒMagnetic Domains
Security Affairs newsletter Round 544 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท20h
๐Ÿ›กCybersecurity
Daring Fireball: Folder Quick Look
daringfireball.netยท1d
๐ŸŽApple Archive
From oil to gemstones: Our shifting understanding of the value of data
ipkitten.blogspot.comยท20hยท
๐Ÿ”Vector Forensics
Episode 166 - Beyond the PDP-11
adventofcomputing.libsyn.comยท8h
๐ŸงฒRISC-V Archaeology
The Algorithmic Archive: a project overview
blogs.bodleian.ox.ac.ukยท2d
๐Ÿ—œ๏ธZstandardized Archives
New Issue: American Archivist
archivespublishing.comยท4d
๐Ÿ—ƒarchives