🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔎 OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Navigating Wikipedia’s Knowledge Discrepancies
diff.wikimedia.org·1d
📰Content Curation
Smarter AI for Critical Operations: Why Data Matters
thenewstack.io·2d
🌊Stream Processing
Wireless Airspace Defense for Modern Data Centers
bastille.net·2d
📡Network Monitoring
Show HN: Rastion – Autonomous Monitoring Systems
rastion.com·31m·
Discuss: Hacker News
⚙️Batch Processing
The High Stakes of Biometric Surveillance
techpolicy.press·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
State of the Art of Prompt Engineering • Mike Taylor • GOTO 2025
youtube.com·5h
🖥️Terminal Renaissance
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.org·1d
🌐DNS Security
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.to·1d·
Discuss: DEV
🌀Brotli Internals
AERONET: Ensuring quality satellite data for mineral exploration
phys.org·2d
🌈Spectroscopy
How AI Detects Cancer in Whole Slide Images
hackernoon.com·22h
🧠Machine Learning
A Wide Reduction Trick (2022)
words.filippo.io·14h·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Physics-Informed Linear Model (PILM): Analytical Representations and Application to Crustal Strain Rate Estimation
arxiv.org·13h
🌀Differential Geometry
Mastering Dimensionality Reduction: A Comprehensive Guide to PCA, t-SNE, UMAP, and Autoencoders
dev.to·8h·
Discuss: DEV
📐Vector Dimensionality
Over 1 million records from US adoption organization left exposed online
techradar.com·2h
🔓Hacking
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.org·1d
🎯Threat Hunting
Two Types of Data Privacy Controls
cacm.acm.org·3d
🕳️Information Leakage
Machine Learning Fundamentals: dimensionality reduction
dev.to·1d·
Discuss: DEV
📐Linear Algebra
China-Backed Salt Typhoon Hacks US National Guard for Nearly a Year
darkreading.com·4h
🛡Cybersecurity
Xiangqi-R1: Enhancing Spatial Strategic Reasoning in LLMs for Chinese Chess via Reinforcement Learning
arxiv.org·13h
🔲Cellular Automata
Machine Learning Fundamentals: dimensionality reduction example
dev.to·1d·
Discuss: DEV
📐Vector Dimensionality
Loading...Loading more...
AboutBlogChangelogRoadmap