Automated Forensic Artifact Extraction & Reconstruction via Dynamic Graph Neural Networks
🔍Vector Forensics
Flag this post
MPEG-2 DCT Recompression FAQ (2003)
✅Verification Codecs
Flag this post
Explainer: Data and metadata
eclecticlight.co·21h
🏷️Metadata Standards
Flag this post
Aerial View River Landform Video segmentation: A Weakly Supervised Context-aware Temporal Consistency Distillation Approach
arxiv.org·2d
🧠Machine Learning
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·12h
📼Cassette Hacking
Flag this post
pyaccdb: Python library for Microsoft Access .accdb files
yingtongli.me·17h
🔤EBCDIC Mining
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
📄Text Chunking
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
Ikarion MVI formats
codecs.multimedia.cx·1d
🎬WebCodecs
Flag this post
The Small Capacity Memory Card Championship (Japan) results are in — a 0.5MB SmartMedia card won, but a 2KB Casio battery-backed RAM card lost due to a technica...
tomshardware.com·18h
🕹️Retro Gaming
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
Source code for a 1977 version of Zork
🗃️ROM Preservation
Flag this post
New Apple study shows LLMs can tell what you’re doing from audio and motion data
🎵Audio ML
Flag this post
Meta's SAM 3 segmentation model blurs the boundary between language and vision
the-decoder.com·1d
🧮Kolmogorov Complexity
Flag this post
Degradation-Aware Hierarchical Termination for Blind Quality Enhancement of Compressed Video
arxiv.org·2d
📊Rate-Distortion Theory
Flag this post
Data Science Quiz For Humanities
codingthepast.com·1d
🧪Data science
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
Loading...Loading more...