๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Thoughts on creating a tracking pointer class, part 6: Non-modifying trackers
devblogs.microsoft.comยท16h
๐Ÿฆ€Rust Borrowing
Status Week 33
blogs.gnome.orgยท6h
๐Ÿ’งLiquid Types
NFC reader and alarm/door entry system
revk.ukยท1dยท
Discuss: www.revk.uk
๐Ÿ Home Automation
Italian hotels breached for tens of thousands of scanned IDs
malwarebytes.comยท3d
๐Ÿ”คEBCDIC Privacy
6 Genius Level Puzzles
mindyourdecisions.comยท1d
๐Ÿ”ฒCellular Automata
A Smarter Way to License Research Articles for AI
scholarlykitchen.sspnet.orgยท4hยท
Discuss: Hacker News
๐Ÿ“šMARC Evolution
Ika Core Contributor dWallet Labs Reveals REFHE: First FHE Scheme That Works Like a Real CPU
hackernoon.comยท5d
๐Ÿ”Homomorphic Encryption
Securityโ€™s blind spot: the problem with taking CVE scores at face value
techradar.comยท22h
๐Ÿ”“Hacking
IPG: Incremental Patch Generation for Generalized Adversarial Patch Training
arxiv.orgยท1d
โšกIncremental Computation
The Constraint Satisfaction Problem Over Multisorted Cores
arxiv.orgยท1d
๐ŸŽจGraph Coloring
Automating the Derivation of Unification Algorithms: A Case Study in Deductive Program Synthesis
arxiv.orgยท1d
๐Ÿ”ฎProof Search
ATLAS: AI-Native Receiver Test-and-Measurement by Leveraging AI-Guided Search
arxiv.orgยท2h
๐Ÿง Machine Learning
How Tenable Moved From Siloed Security to Exposure Management
tenable.comยท17h
๐ŸŽฏThreat Hunting
Adaptive Spiking with Plasticity for Energy Aware Neuromorphic Systems
arxiv.orgยท2h
๐ŸฆพARM Cortex-M
A Robust Pipeline for Differentially Private Federated Learning on Imbalanced Clinical Data using SMOTETomek and FedProx
arxiv.orgยท4d
๐ŸคSecure Multiparty
Malicious URLs and phishing scams remain a constant threat for businesses - here's what can be done
techradar.comยท15h
๐Ÿ“กFeed Security
Millions of dollars in cryptocurrency has been confiscated as the DoJ cracks down on an infamous ransomware operator
techradar.comยท10h
๐ŸŽซKerberos Attacks
Exploring Multimodal AI Reasoning for Meteorological Forecasting from Skew-T Diagrams
arxiv.orgยท2h
๐Ÿ”ถVoronoi Diagrams
Temporally-Similar Structure-Aware Spatiotemporal Fusion of Satellite Images
arxiv.orgยท1d
๐Ÿ‘๏ธPerceptual Hashing
CORE: Measuring Multi-Agent LLM Interaction Quality under Game-Theoretic Pressures
arxiv.orgยท2h
๐ŸงฎKolmogorov Complexity
Loading...Loading more...
AboutBlogChangelogRoadmap