๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Text Forensics

Document Authentication, Linguistic Analysis, Historical Dating, Stylometric Analysis

Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท10h
๐Ÿ”NTLM Forensics
A.I. Is Homogenizing Our Thoughts
newyorker.comยท2h
๐Ÿ›Digital humanities
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comยท5h
๐ŸŽซKerberos Attacks
Contextualizing SUTRA: Advancements in Multilingual & Efficient LLMs
hackernoon.comยท2h
๐Ÿ’ปLocal LLMs
Show HN: Laburity โ€“ Dark and Deep Web Monitoring
laburity.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comยท8h
๐ŸŽฏThreat Hunting
Driving cost-efficiency and speed in claims data processing with Amazon Nova Micro and Amazon Nova Lite
aws.amazon.comยท1h
๐ŸŒŠStream Processing
What LLMs Know About Their Users
schneier.comยท7hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Detect Narrative Threats with AI Personas
askrally.comยท2dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
Text2Struct: A Machine Learning Pipeline for Mining Structured Data from Text
arxiv.orgยท1d
๐Ÿ”คCharacter Classification
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท14hยท
Discuss: DEV
๐ŸŽตSpectral Hashing
Finding Outliers in Proportions
crimede-coder.comยท2hยท
Discuss: Hacker News
๐Ÿ“ŠCount-Min Sketch
How to Learn Programming for Data Science: A Roadmap for Beginners
kdnuggets.comยท2d
๐ŸงชData science
Local Elasticsearch Playground: A Practical Introduction and hands-on test (and moving to a RAG solution)
dev.toยท1dยท
Discuss: DEV
๐ŸบZIP Archaeology
Unfolding the Past: A Comprehensive Deep Learning Approach to Analyzing Incunabula Pages
arxiv.orgยท1d
๐Ÿค–Manuscript AI
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.toยท4hยท
Discuss: DEV
๐Ÿง Machine Learning
Using an LLM for query planning in RAG โ€“> 40% better answer relevance
techcommunity.microsoft.comยท22hยท
Discuss: Hacker News
๐Ÿ”Information Retrieval
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท1d
๐Ÿ”ฌArchive Forensics
Unveiling Factors for Enhanced POS Tagging: A Study of Low-Resource Medieval Romance Languages
arxiv.orgยท1d
๐Ÿ‘๏ธMedieval OCR
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.comยท4hยท
Discuss: Hacker News
๐Ÿ“‹DFDL
Loading...Loading more...
AboutBlogChangelogRoadmap