Perceptual Hashing, Acoustic Fingerprinting, Content Identification, Signal Matching
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.com·4h
Movement signatures: How we move, gesture and use facial expressions could be as unique as a fingerprint
phys.org·11h
FLINT: Fast Library for Number Theory
flintlib.org·7h
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·17h
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·1d
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·12h
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·13h
Sets & Heaps in Haskell and Rust
mmhaskell.com·17h
Song recommendations with F# free monads
blog.ploeh.dk·19h
Loading...Loading more...