-
Upss, turned out we don't have a developer-level documentation of our backups infrastructure (and call me a conservative, but qubes-devel threads do not count as a documentation!).
Things we should…
-
**Name**: n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
**Authors**: Mahmood Sharif, Lujo Bauer, Michael K. Reiter
**Paper**: https://arxiv.org/pdf/1…
-
Right now dSIPRouter implements basic security best practices for networking security but at the current state it is BASIC.
We should gradually more towards more active mitigation such as blocking …
-
### What client do you play on?
enUS
### Faction
- [X] Alliance
- [X] Horde
### Content Phase:
- [ ] Generic
- [ ] 1-19
- [ ] 20-29
- [ ] 30-39
- [ ] 40-49
- [ ] 50-59
- [X] 60
### Current Behav…
-
This issue is intended as a place to keep discussion around the topic of security. It is not intended to be 'resolved', but rather should reflect the changing requirements of the project stakeholders…
-
Intentional Architecture in Business
Purpose: Just as in IT, intentional business architecture would involve a set of purposeful statements, models, and decisions aimed at achieving a future state.
Dy…
-
Reviewer 1
> The authors apply their approach on existing models, yet occasionally suggesting that they'd have a broader empirical evaluation. They suggest to have run experiments which they have …
-
Lots of scientists want to discuss or research things that, if they do so openly, might lead to them being attacked. I'll write a simple guide to working safely, anonymously and securely online.
-
**Is your feature request related to a problem?**
Suricata is one of the largest open source IDS systems and is often used in combination with the ELK stack. It would be nice to be able to feed this …
-
Subscribe to this issue and stay notified about new [weekly trending repos in unknown languages](https://github.com/trending/unknown?since=weekly)!