-
As mentioned in #88, there is some actual research I would like to finish up before defending, which would likely take my thesis into October. I thought that the seminar required for a SE MASc took pl…
-
If we have nodes 0-5 for each team/user, are they assigned a variety of versions (not in a predictable pattern)?
Can users update the source code of the nodes?
Would that allow a way to do defens…
-
The WireServing bug can be exploited by leveraging an AKS cluster that use the Azure CNI for network configuration and Azure network policy (NPM). The attack hinges on a TLS bootstrap attack targeting…
-
> Defense against malicious clients (e.g. a malicious browser extension) are also not described well in the documentation. There's statements about the use of QR codes here, though (again), it is uncl…
-
add info in tooltip that war support is higher in stage II and III
-
How can I get scalable defense mentioned in the paper?
-
### Problem Description
Planets like "New Wales", "Remote Blue", and "Shangri-La" (and space-station "Ceilia'sei") mention defense systems against spaceships in their description. If combat happens n…
-
Dear author, thank you for your code and creative ideas, they have left a deep impression on me. I have a question regarding your code: In core.dataset.py, in each dataset class, you split the test_da…
-
![image](https://github.com/user-attachments/assets/50670931-9c47-460b-942a-2e4d931f22a6)
Also normal Factories minse and desfenses have to be possible. there are only auto orders.
-
### Description
# Goal: reduce future regressions in the area of memory leaks, with a special focus on classloader leaks
In its very nature of reloading the whole app, including many 3rd party d…
Sanne updated
1 month ago