๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽต Audio Steganography

Hidden Data, Covert Channels, Signal Embedding, Acoustic Hiding

Mali's former prime minister charged with embezzlement after criticizing junta
lemonde.frยท2d
๐Ÿ›กCybersecurity
Renesas RA4C1 Arm Cortex-M33 MCU targets Smart Meters and energy-efficient IoT applications
cnx-software.comยท1h
๐Ÿ”ŒMicrocontrollers
The Art of the Honeypot Account: Making the Unusual Look Normal
adsecurity.orgยท3d
๐ŸขActive Directory
USCIS: The First A-File
uscis.govยท5hยท
Discuss: Hacker News
๐Ÿ“œFamily History Data
Finding links between fraudulent email domains using graph-based clustering
blog.castle.ioยท3dยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
Simpler Category Theory
ryanbrewer.devยท1dยท
Discuss: Hacker News
๐Ÿ”€Category Theory
Can AI weaponize new CVEs in under 15 minutes?
valmarelox.substack.comยท5hยท
Discuss: Substack
๐ŸงชProtocol Fuzzing
How App Attestation Stops API Abuse in Mobile Apps
zimperium.comยท1d
๐Ÿ›ก๏ธARM TrustZone
Macroeconomic Foundation of Monetary Accounting by Diagrams of Categorical Universals
arxiv.orgยท1d
๐Ÿ”€Category Theory
Rapid Response: Zimperium Detects Lazarus Stealer Campaign with Full Coverage and Additional Samples
zimperium.comยท1d
๐Ÿ›ก๏ธARM TrustZone
Got tired of bad PDF WebApp so we made an Open-Sourced,Free,Private Alternative
github.comยท13hยท
Discuss: Hacker News
๐Ÿ“„PDF Internals
Label Uncertainty for Ultrasound Segmentation
arxiv.orgยท5h
๐Ÿง Machine Learning
Data-Driven Discovery of Multi-Dimensional Breakage Population Balance Equations
arxiv.orgยท2d
๐Ÿ“Information Geometry
Exact Shapley Attributions in Quadratic-time for FANOVA Gaussian Processes
arxiv.orgยท1d
๐Ÿง Machine Learning
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
microsoft.comยท3d
๐ŸŒDNS Security
Contrastive Learning on Multimodal Analysis of Electronic Health Records
arxiv.orgยท2d
๐Ÿง Machine Learning
Grepcidr3: High performance search for IP addresses and CIDR ranges
github.comยท2dยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
FBI: Russian spies exploit 7yo Cisco bug to slurp critical infrastructure config
theregister.comยท1dยท
Discuss: Hacker News
๐ŸŒNetwork Security
Active Learning for Neurosymbolic Program Synthesis
arxiv.orgยท5h
๐Ÿ’ปProgramming languages
Synthesis and SOS-based Stability Verification of a Neural-Network-Based Controller for a Two-wheeled Inverted Pendulum
arxiv.orgยท5h
๐Ÿ“Interval Arithmetic
Loading...Loading more...
AboutBlogChangelogRoadmap