๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ WARC Forensics

Web Archive Analysis, Internet Archaeology, Crawl Reconstruction, URL Timeline Analysis

Using the mdfind command line tool to find duplicate copies of an application on macOS Sequoia
derflounder.wordpress.comยท1d
๐ŸบZIP Archaeology
Updates 2025 H1
mudkip.meยท1d
๐Ÿ”ŒOperating system internals
The hidden risks of browser extensions โ€“ and how to stay safe
welivesecurity.comยท23h
๐Ÿ”“Hacking
Open Security News week 30-2025
nocomplexity.comยท2d
๐Ÿ”“Hacking
Strong Goldbach in 2nd-order logic under standard semantics, semantically closed
medium.comยท7hยท
Discuss: Hacker News
๐ŸงฎConstraint SMT
Every Single Human. Like. Always.
randsinrepose.comยท16h
โšกProof Automation
Practical Guide to Personal Data Security: Balancing Usability and Protection
guptadeepak.comยท12hยท
Discuss: Hacker News
โš–๏ธLegal Compliance
The Weakest Link Fallacy
cs.ru.nlยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Secure Overseas E-Commerce Review Accounts, Avoid Detection by Platforms
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Mastering Back-of-the-Envelope Calculations for System Design day 15 of learning system design
dev.toยท1dยท
Discuss: DEV
โฑ๏ธSMPTE Timecode
Knowledge-Guided Memetic Algorithm for Capacitated Arc Routing Problems with Time-Dependent Service Costs
arxiv.orgยท4h
๐Ÿ”—Topological Sorting
SHoM: A Mental-Synthesis Trust Management Model for Mitigating Botnet-Driven DDoS Attacks in the Internet of Things
arxiv.orgยท4h
๐ŸŽฏThreat Hunting
An Algorithm-to-Contract Framework without Demand Queries
arxiv.orgยท1d
๐ŸŽฏPerformance Proofs
Strategic Motivators for Ethical AI System Development: An Empirical and Holistic Model
arxiv.orgยท1d
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Failure Risk Prediction in a MOOC: A Multivariate Time Series Analysis Approach
arxiv.orgยท4h
๐ŸงชData science
Interpretable Anomaly-Based DDoS Detection in AI-RAN with XAI and LLMs
arxiv.orgยท4h
๐Ÿ‘๏ธObservatory Systems
LinDeps: A Fine-tuning Free Post-Pruning Method to Remove Layer-Wise Linear Dependencies with Guaranteed Performance Preservation
arxiv.orgยท4h
๐Ÿ“ŠQuantization
MoCTEFuse: Illumination-Gated Mixture of Chiral Transformer Experts for Multi-Level Infrared and Visible Image Fusion
arxiv.orgยท1d
๐ŸŒ€Fractal Compression
How to Build a Vector Database Using Amazon S3 Vectors
dev.toยท1hยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
Training language models to be warm and empathetic makes them less reliable and more sycophantic
arxiv.orgยท4h
๐ŸŽ™๏ธWhisper
Loading...Loading more...
AboutBlogChangelogRoadmap