Research Software Directory adopts Software Heritage IDs
softwareheritage.org·4h
🏛️OAIS Implementation
Flag this post
An AI slop farm stole my identity
🚀Indie Hacking
Flag this post
Real-time stock volatility prediction with deep learning on a time-series DB
🌊Streaming Databases
Flag this post
Harriette Cole: Was this lunch incident a red flag about my new friend?
mercurynews.com·10h
💻Local first
Flag this post
Reproducing the AWS Outage Race Condition with a Model Checker
📡Network Protocol Design
Flag this post
Online insurance cover not valid for phishing via SMS
heise.de·1d
🎫Kerberos Attacks
Flag this post
[D][P] PKBoost v2 is out! An entropy-guided boosting library with a focus on drift adaptation and multiclass/regression support.
🌀Brotli Dictionary
Flag this post
Joint Visible Light and Backscatter Communications for Proximity-Based Indoor Asset Tracking Enabled by Energy-Neutral Devices
arxiv.org·1d
📡Bluetooth Archaeology
Flag this post
Idor — TryHackMe writeup
infosecwriteups.com·4d
🌐DNS Security
Flag this post
Ariadne: A Controllable Framework for Probing and Extending VLM Reasoning Boundaries
arxiv.org·15h
🎯Proof Tactics
Flag this post
NSA Issues Microsoft Exchange Server ‘High-Risk Of Compromise’ Alert
forbes.com·2d
🏢Active Directory
Flag this post
Supercharge Your LLMs: Turn Basic APIs into 3D AI Desktop Companions with Zero Code Change
🔌Interface Evolution
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.com·5d
🦠Malware Analysis
Flag this post
Deep Learning Approach to Anomaly Detection in Enterprise ETL Processes with Autoencoders
arxiv.org·15h
🧠Machine Learning
Flag this post
Enhancing LOD Integrity via Hyperdimensional Semantic Graph Normalization & Automated Anomaly Detection
📰Content Curation
Flag this post
GrowthHacker: Automated Off-Policy Evaluation Optimization Using Code-Modifying LLM Agents
arxiv.org·15h
⚡Incremental Computation
Flag this post
Loading...Loading more...