🎲 My NFC-enabled business card
herczegzsolt.hu·4h
🔌Offline Computing
Flag this post
Crossed wires: a case study of Iranian espionage and attribution
proofpoint.com·1d
🚩CTF Competitions
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
🦀Rust Programming Language
Flag this post
Looking for help with GTS random crashing
🧩WASM
Flag this post
What Artifacts Teach Us
systemsapproach.org·3d
🏗️Resilient Infrastructure
Flag this post
'Self-driving' lab learns to grow materials on its own
techxplore.com·4h
🧰Low Tech
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.edu·16h
💻Hacking Games Puzzles Programming Skills Competition
Flag this post
AI Papers to Read in 2025
towardsdatascience.com·21h
🧮Algorithmic Puzzles
Flag this post
[Linkpost] How to Win Board Games
lesswrong.com·2h
💻Hacking Games Puzzles Programming Skills Competition
Flag this post
Enhanced Dielectric Performance of Aircraft HV Power Cables via Nanocomposite Crosslinking Optimization
🔌Offline Computing
Flag this post
🧠 Soft Architecture (Part B): Emotional Timers and the Code of Care (Part 5 of the SaijinOS series)
🏗️Resilient Infrastructure
Flag this post
Math.random, friend or foe?
🧮Algorithmic Puzzles
Flag this post
Zero-Trust Security Market is expected to generate a revenue of USD 124.50 Billion by 2032, Globally, at 16.7% CAGR: Verified Market Research®
prnewswire.com·2d
🏗️Resilient Infrastructure
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·2d
🧩WASM
Flag this post
Berkeley to encrypt police scanners starting Thursday
mercurynews.com·22h
🔌Offline Computing
Flag this post
Fuzzy Soft Set Theory based Expert System for the Risk Assessment in Breast Cancer Patients
arxiv.org·1d
🔌Offline Computing
Flag this post
QuPCG: Quantum Convolutional Neural Network for Detecting Abnormal Patterns in PCG Signals
arxiv.org·1d
🧮Algorithmic Puzzles
Flag this post
A unified physics-informed generative operator framework for general inverse problems
arxiv.org·14h
🧮Algorithmic Puzzles
Flag this post
The kgateway vulnerabilities explained (and why I disagree on its score!)
🔌Offline Computing
Flag this post
Loading...Loading more...