A Lorenz Teletype Shows Us Its Secrets
hackaday.com·10h
💾vintage computing
Dark Engagement
zakelfassi.com·1d·
Discuss: Hacker News
⚖️Feed Ranking
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·5d·
Discuss: Hacker News
🦠Malware Analysis
Internet favors the development of flexible identities among language learners
phys.org·2h
🏛Digital humanities
An Illustrated Introduction to Linear Algebra
ducktyped.org·1d·
Discuss: Hacker News
📈Linear programming
Nobel Prize in Physiology or Medicine 2025
nobelprize.org·1d·
Discuss: Hacker News
🧬Copy Number Variants
Patch Now: ‘RediShell’ Threatens Cloud Via Redis RCE
darkreading.com·8h
🔓Hacking
DRPO: Efficient Reasoning via Decoupled Reward Policy Optimization
arxiv.org·14h
🎯Performance Proofs
Mapping Patient-Perceived Physician Traits from Nationwide Online Reviews with LLMs
arxiv.org·14h
🔍Information Retrieval
Decoding Emotion in the Deep: A Systematic Study of How LLMs Represent, Retain, and Express Emotion
arxiv.org·14h
💻Local LLMs
This infamous ransomware has returned, and it's more dangerous than ever
techradar.com·3h
🔓Hacking
Automated Anomaly Detection in Industrial Control Systems via Dynamic Graph Neural Network Pruning
dev.to·2d·
Discuss: DEV
🎯Threat Hunting
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan
dev.to·3d·
Discuss: DEV
🎯Threat Hunting
Forking-Sequences
arxiv.org·14h
🌸Bloom Variants
Spiral of Silence in Large Language Model Agents
arxiv.org·1d
💻Programming languages
Vibe Coding Through Subscriptions, Payments, and PDF Nightmares
dev.to·5h·
Discuss: DEV
💾Persistence Strategies
Precision Inertial Navigation via Multi-Modal Sensor Fusion and Adaptive Kalman Filtering
dev.to·9h·
Discuss: DEV
🌊Stream Processing
RediShell: Critical Remote Code Execution
wiz.io·20h·
Discuss: Hacker News
📦Container Security