🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

Simple Methods Defend RAG Systems Well Against Real-World Attacks
arxiv.org·8h
🦀Rust
Indexing Blockchain Events with Rust and Alloy
blog.bilinearlabs.io·14h·
Discuss: Hacker News
🦀Rust
Cisco’s Foundation AI Advances AI Supply Chain Security With Hugging Face
blogs.cisco.com·33m
🦀Rust
🚀 Learning Update: Bash, Python, and Cybersecurity Training!
dev.to·20h·
Discuss: DEV
🦀Rust
Monitor your security cameras with locally processed AI
frigate.video·7h·
Discuss: Hacker News
🛡️Security
Efficient Byzantine Consensus MechanismBased on Reputation in IoT Blockchain
arxiv.org·8h
🐳Container Orchestration
Uncovering memory corruption in NVIDIA Triton (as a new hire)
blog.trailofbits.com·1h·
Discuss: Hacker News
🦀Rust
Six Guidelines for Trustworthy, Ethical and Responsible Automation Design
arxiv.org·8h
🛡️Security
How to Create Unbreakable Job Security: A Software Developer's Guide to Making Yourself Indispensable
getparthenon.com·1d·
Discuss: Hacker News, r/programming
🔄DevOps
AI-Driven Cybersecurity Threat Detection: Building Resilient Defense Systems Using Predictive Analytics
arxiv.org·8h
🛡️Security
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.org·8h
✅Formal Verification
Long-term resilience of online battle over vaccines and beyond
arxiv.org·8h
🎨UX, UI
Introducing Server-Sent Events in Python
towardsdatascience.com·19h
🦀Rust
Securing OAuth: Best Practices for Safer Authorization Flows
dev.to·1d·
Discuss: DEV
🛡️Security
Improving performance of content-centric networks via decentralized coded caching for multi-level popularity and access
arxiv.org·8h
🏗️Language Design
Proactive Disentangled Modeling of Trigger-Object Pairings for Backdoor Defense
arxiv.org·8h
🛡️Security
New Book (well, my first one) on Kubernetes Security
reddit.com·1d·
Discuss: r/kubernetes
🐳Container Orchestration
Centralized Dynamic State Estimation Algorithm for Detecting and Distinguishing Faults and Cyber Attacks in Power Systems
arxiv.org·8h
🦀Rust
Building an AI-driven course content generation system using Amazon Bedrock
aws.amazon.com·18h
🏗️Language Design
How to Accurately Evaluate IP Geolocation Data Beyond Provider Consensus
hackernoon.com·21h
✅Formal Verification
Loading...Loading more...
AboutBlogChangelogRoadmap