Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17956
posts in
305.7
ms
Spider-Sense:
Intrinsic
Risk Sensing for Efficient Agent Defense with Hierarchical Adaptive
Screening
arxiv.org
·
3d
🎯
Threat Hunting
SMCP
: Secure Model Context
Protocol
arxiv.org
·
6d
🔄
Session Type Inference
7 Advanced Feature Engineering
Tricks
Using LLM
Embeddings
machinelearningmastery.com
·
6d
🧮
Vector Embeddings
What’s the
entropy
of a random
integer
?
quomodocumque.wordpress.com
·
5d
·
Discuss:
Hacker News
🎯
Arithmetic Coding
Guest
post:
Balancing
your dataset? Mind the privacy leaks!
desfontain.es
·
5d
·
Discuss:
Hacker News
🔒
Privacy Archives
Cisco
is
Proud
to Champion the UK’s Software Security Code of Practice
blogs.cisco.com
·
6d
🌐
Network Security
The Architecture of Open Source Applications (Volume 1)
Berkeley
DB
aosabook.org
·
6d
·
Discuss:
Hacker News
📦
CBOR Extensions
From
Clawdbot
to
Moltbot
to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
tenable.com
·
5d
🔓
Hacking
Training a Small Language Model
elijahpotter.dev
·
6d
·
Discuss:
Hacker News
🤖
Grammar Induction
Example of Windows
Warbird
Encryption/Decryption
downwithup.github.io
·
6d
·
Discuss:
Hacker News
💣
Compression Security
Millets
: A practical memory-safety and thread-safety
experiment
eagledot.xyz
·
6d
·
Discuss:
Lobsters
,
Hacker News
🦀
Rust Borrowing
Using Agents to Scale
Harvey
’s
Knowledge
Sources
harvey.ai
·
6d
·
Discuss:
Hacker News
🔗
Constraint Handling
The Next Generation of
Cybersecurity
Protection
for Healthcare
hackernoon.com
·
5d
🛡
Cybersecurity
Automating Cybersecurity Governance: How
Bitsight
Is Expanding AI-Powered Workflows Across SPM and
VRM
bitsight.com
·
4d
🔗
Data Provenance
Semantic
Operators
: Run LLM
Queries
Directly in SQL
tacnode.io
·
6d
·
Discuss:
Hacker News
🧮
Datalog
An AI
Workflow
to Slow Down and
Reflect
in the Age of Inference-Speed
souravinsights.com
·
5d
·
Discuss:
Hacker News
⚡
Proof Automation
Taming the Flat AST:
Ergonomics
in the Age of Zero
Allocations
modern-c.blogspot.com
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
r/golang
📝
Compiler Design
AI agents in enterprises: Best practices with Amazon
Bedrock
AgentCore
aws.amazon.com
·
5d
🌊
Streaming Systems
RFC 3284: The
VCDIFF
Generic
Differencing
and Compression Data Format
datatracker.ietf.org
·
6d
·
Discuss:
Hacker News
△
Delta Compression
Treating
documentation as an
observable
system in RAG-based products
alexanderfashakin.substack.com
·
6d
·
Discuss:
Substack
📚
MARC Evolution
Loading...
Loading more...
« Page 16
•
Page 18 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help