๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Text Forensics

Document Authentication, Linguistic Analysis, Historical Dating, Stylometric Analysis

Detecting Machine-Generated Texts: Not Just "AI vs Humans" and Explainability is Complicated
arxiv.orgยท10h
๐ŸงฎKolmogorov Complexity
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท23h
๐Ÿ”ฌArchive Forensics
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comยท7h
๐Ÿ“Concrete Syntax
Mastering Multivariate Analysis: A Guide for Data Science Enthusiasts
dev.toยท18hยท
Discuss: DEV
๐Ÿ“ŠVector Quantization
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiยท19hยท
Discuss: Hacker News
๐Ÿค–Archive Automation
Why document-borne malware needs to be back on the radar for organization
techradar.comยท1d
๐Ÿ”“Hacking
Filter smarter: A better way to investigate fraud with Search
fingerprint.comยท15h
๐Ÿ”BitFunnel
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesnโ€™t)
blog.elcomsoft.comยท1d
๐Ÿ”“Password Cracking
Linguistics vs. archeology and (physical) anthropology
languagelog.ldc.upenn.eduยท13h
๐Ÿ“กFrequency Archaeology
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.comยท56m
๐Ÿฆ Malware Analysis
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท17h
๐Ÿ”—Data Provenance
The Inefficiency in Digital Forensics
cyb3rops.medium.comยท2d
๐ŸšจIncident Response
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท5h
๐Ÿ”NTLM Forensics
A Briefing on Logistic Regression
blog.engora.comยท1hยท
Discuss: Hacker News
๐Ÿง Machine Learning
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comยท1h
๐ŸŽซKerberos Attacks
Show HN: Laburity โ€“ Dark and Deep Web Monitoring
laburity.comยท23hยท
Discuss: Hacker News
๐Ÿ”“Hacking
What LLMs Know About Their Users
schneier.comยท3h
๐Ÿ’ปLocal LLMs
Detect Narrative Threats with AI Personas
askrally.comยท2dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
Text2Struct: A Machine Learning Pipeline for Mining Structured Data from Text
arxiv.orgยท1d
๐Ÿ”คCharacter Classification
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท10hยท
Discuss: DEV
๐ŸŽตSpectral Hashing
Loading...Loading more...
AboutBlogChangelogRoadmap