🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Digital Forensics

File Recovery, Metadata Analysis, Evidence Preservation, Disk Imaging

(1) Fitting hierarchical models in genetics, (2) A Stan model that runs faster with 400,000 latent parameters, (3) Super-scalable penalized maximum likelihood i...
statmodeling.stat.columbia.edu·6h
🧮Kolmogorov Bounds
How Science may help us smell the past (2017)
cen.acs.org·16h·
Discuss: Hacker News
🧪Manuscript Chemistry
AI Abuse to Skirt Copyright Law
nickybay.com·2d·
Discuss: Hacker News
🦠Parasitic Archives
Smash-and-grab robbers steal jewelry at Contra Costa mall
mercurynews.com·6h
🔬Hardware Forensics
Information Fusion in Multimodal IoT Systems for physical activity level monitoring
arxiv.org·1d
📈Mutual Information
A Real Clickfix Attack: How This Social Engineering Hack Unfolds
bleepingcomputer.com·8h·
Discuss: Hacker News
🚀Indie Hacking
BGH rules against Sony: Cheat tools do not infringe copyright
heise.de·12h
⚖️Game Preservation Ethics
Segment Anything for Video: A Comprehensive Review of Video Object Segmentation and Tracking from Past to Future
arxiv.org·19h
📐Projective Geometry
NIST discovers DevSecOps, thinks world should really check this out
theregister.com·4h
🛡Cybersecurity
StaffPro: an LLM Agent for Joint Staffing and Profiling
arxiv.org·1d
📚Digital Humanities
AnimalClue: Recognizing Animals by their Traces
arxiv.org·2d
🕳️Persistent Homology
Adobe Security Recap: 2024 Ambassador World Cup Final Four
hackerone.com·3h
🎫Kerberos Exploitation
Beyond the Hype: 4 Ways To Use AI for Cybersecurity Defenses
thenewstack.io·5h
🎯Threat Hunting
Why LLMs struggle with analytics
dev.to·2d·
Discuss: DEV
🗄️Database Internals
Open source PDF reader built with Rust, Dioxus and PDFium
github.com·6h·
Discuss: Hacker News
📄PDF Internals
Machine Learning Fundamentals: k-nearest neighbors example
dev.to·2d·
Discuss: DEV
🗂️Vector Databases
Understanding Streamable HTTP (the new one after SSE) of MCP Server/Client Architecture (+vs SSE)
dev.to·10h·
Discuss: DEV
⚡gRPC
Using Scaling Laws for Data Source Utility Estimation in Domain-Specific Pre-Training
arxiv.org·19h
🧠Machine Learning
How HackerOne’s API Pentesting Delivers A Community-Powered Model
hackerone.com·2d
🧪Protocol Fuzzing
Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware
securityaffairs.com·3h
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap