🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”Ž OSINT Techniques

Intelligence Gathering, Public Information, Investigation Methods, Data Mining

Navigating Wikipedia’s Knowledge Discrepancies
diff.wikimedia.orgΒ·1d
πŸ“°Content Curation
Tracking Activity on your App Turn data into smart decisions and valuable insights
blog.codeminer42.comΒ·4h
πŸ“ŠFeed Optimization
CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability
offsec.comΒ·5h
🌐WASI
Smarter AI for Critical Operations: Why Data Matters
thenewstack.ioΒ·2d
🌊Stream Processing
Wireless Airspace Defense for Modern Data Centers
bastille.netΒ·2d
πŸ“‘Network Monitoring
Show HN: Rastion – Autonomous Monitoring Systems
rastion.comΒ·5hΒ·
Discuss: Hacker News
βš™οΈBatch Processing
The High Stakes of Biometric Surveillance
techpolicy.pressΒ·1dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
A Wide Reduction Trick (2022)
words.filippo.ioΒ·19hΒ·
Discuss: Lobsters, Hacker News, r/programming
🌳Archive Merkle Trees
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.orgΒ·1d
🎯Threat Hunting
Two Types of Data Privacy Controls
cacm.acm.orgΒ·3d
πŸ•³οΈInformation Leakage
Machine Learning Fundamentals: dimensionality reduction
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Linear Algebra
China-Backed Salt Typhoon Hacks US National Guard for Nearly a Year
darkreading.comΒ·9h
πŸ›‘Cybersecurity
Xiangqi-R1: Enhancing Spatial Strategic Reasoning in LLMs for Chinese Chess via Reinforcement Learning
arxiv.orgΒ·18h
πŸ”²Cellular Automata
Machine Learning Fundamentals: dimensionality reduction example
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Vector Dimensionality
Ukraine wing of US-founded terrorist group says it was involved in killing of intelligence officer in Kyiv
theguardian.comΒ·1dΒ·
Discuss: Hacker News, r/news
πŸ›‘Cybersecurity
Multimodal Coordinated Online Behavior: Trade-offs and Strategies
arxiv.orgΒ·18h
πŸ“ŠFeed Optimization
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgΒ·18h
πŸ•΅οΈVector Smuggling
A Deep Dive into Clustering for Customer Segmentation
dev.toΒ·1dΒ·
Discuss: DEV
🌊Spectral Clustering
A Bayesian Incentive Mechanism for Poison-Resilient Federated Learning
arxiv.orgΒ·18h
🀐Secure Multiparty
Tracing the Path to Grokking: Embeddings, Dropout, and Network Activation
arxiv.orgΒ·18h
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap