-
Displaying the verifiee’s name and d.o.b. on the verifier’s device poses a basic privacy breach risk. Name and birth is nontrivial personal data.
Verifier’s device is effectively *any* reasonably …
-
Hello nice to meet you actualy i want to ask about from your paper just 347 and 365 for beningn and malware , how is it? Does it you remove the dataset and make it 347 and 365 . I hope i could get thi…
-
This is actually not a valid template, please choose Bug Report!
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
#…
-
This is actually not a valid template, please choose Bug Report!
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
# PICK BUG REPORT
#…
-
If anyone can find a list to start with, it would be very useful to create a "targeted technology" taxonomy. This would indicate what technology a piece of malware is targeting. Like OS (windows/linux…
-
**Describe the bug**
A clear and concise description of what the bug is.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to '...'
2. Click on '....'
3. Scroll down to '....'
4. See …
-
Hi, you can add a citation to the paper in the README file, I saw this repository on github but couldn't find the corresponding paper.
-
I managed to embarass myself by mistaking the output of the script loading the .STIX2 files as and indication that the device was infected i.e.
INFO [mvt.ios.cmd_check_backup] Extracted 1547 in…
-
**Printer type** - MK4 built from kit
**Optional upgrades** - None
**Is your suggested improvement related to an existing problem? Please describe.**
Currently, PrusaLink is accessible via us…
-
## What's the problem (or question)?
Add support for `Mach-O 64-bit dynamically linked shared library arm64` (de)compression.
## What should have happened?
I know that [#57](https://g…