Tycoon 2FA Phishing Kit Analysis
cybereason.com·19h
🎫Kerberos Attacks
Flag this post
State of the Source at ATO 2025: Cybersecurity
opensource.org·1h
🔓Open Source Software
Flag this post
Research roundup: 6 cool science stories we almost missed
arstechnica.com·2d
🦴Database Paleontology
Flag this post
Hou Tu Pranownse Inglish
🗣️CMU Pronouncing
Flag this post
Making a C64/C65 compatible computer: MEGAphone contact list and Dialer
📺VT100 Emulation
Flag this post
AWK technical notes (2023)
📝Shell Parsing
Flag this post
Matrix Phylogeny: Compact Spectral Fingerprints for Trap-Robust Preconditioner Selection
arxiv.org·8h
🌊Spectral Clustering
Flag this post
Reducing students' misconceptions about video game development. A mixed-method study
arxiv.org·8h
🗺️Competency Maps
Flag this post
Real-Time Process Optimization via Adaptive Bayesian Reinforcement Learning and Multi-Objective Genetic Algorithms
🧮Algorithmic Cooking
Flag this post
Robust Single-Agent Reinforcement Learning for Regional Traffic Signal Control Under Demand Fluctuations
arxiv.org·8h
🔲Cellular Automata
Flag this post
CoT-Saliency: Unified Chain-of-Thought Reasoning for Heterogeneous Saliency Tasks
arxiv.org·8h
📊Learned Metrics
Flag this post
How AIOps is Revolutionizing DevOps Monitoring in the Cloud Era
devops.com·2h
👁️System Observability
Flag this post
On Designing Low-Latency Systems for High-Traffic Environments
hackernoon.com·21h
🌊Stream Processing
Flag this post
Cross-Corpus Validation of Speech Emotion Recognition in Urdu using Domain-Knowledge Acoustic Features
arxiv.org·1d
🎵Audio ML
Flag this post
Automated Variant Analysis & Kinship Assignment via Multi-Modal Data Fusion
📜Family History Data
Flag this post
Cybersecurity Laws Will Shape the Future of DevOps
devops.com·1d
❄️Nix Adoption
Flag this post
Loading...Loading more...