-
Native context menus, popups and tooltips are also displayed outside the native program window in the operating system.
What if popovers etc. could also display like this?
With defined rules f…
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
xvnpw updated
3 weeks ago
-
A test failed on a tracked branch
```
AssertionError: Timed out retrying after 150000ms: Expected to find element: `[data-test-subj="expand-event"]`, but never found it.
at expandFirstAlert (webp…
-
## Use case
Currently Organizations / Threat Actor Groups and Individuals / Threat Actor Individuals are tracked as different entities. This leads to inconsistencies due to the fact that they can hav…
-
The primary goal is to detect anomalies in network traffic data by leveraging the sequential learning capabilities of LSTM networks, enhanced by the bidirectional processing of BiLSTM.
It is handy fo…
-
I made a simple system model to test the risk-report algorithm and have found a bug in the Java attack path code.
The model is "small-uncontrolled" ([small-uncontrolled 2024-05-19T11_41.nq.gz](http…
-
Hey,
In the context of the PROTECT project, we defined a list of exemptions to GDPR’s data subject rights. We welcome discussions with experts in law.
The concepts we are proposing to add to DPV…
-
Hi Everyone,
We are trying to add some threats to the Pytm sources. We are trying to figure out which categories to use for the threats. The categories are causing use trouble.
Here are some exa…
-
**The Problem.**
There are several existing projects in GitHub that aggregate several sources to come up with a list of Command and Control Servers. This IP Address, are useful to be integrated into…
-
### Question
Hello Apache ShenYu Community,
I'm interested in exploring the possibility of adding an AI plugin to the ShenYu ecosystem. The goal is to leverage artificial intelligence to enhance t…