-
Post questions here for this week's oritenting readings: Collins, Randall. 2009. “The Micro-sociology of Violent Confrontations” and “Confrontational Tension and Incompetent Violence” (beginning of Ch…
-
**Is your feature request related to a problem? Please describe.**
As a dedicated contributor to the Meeds DAO platform, I am increasingly concerned about the security vulnerabilities that could poten…
-
**What are you proposing?**
We are proposing to improve the description text of the forms fields. We are updating some of the form UI components to make it easier for users to define rules.
**What…
-
Today Microsoft updated the database for security essentials and Windows Defender. Therefore, all software using chisel on Microsoft will be prevented from running because it is considered a "hack too…
-
Thank you all for your questions and critiques!
- @albero94, Alvaro Albero, Critical: Is the OBD-II Connector the only point of attack, and is there a way to keep attack after disconnected from the…
-
## Keyword: detection
### RacketStore: Measurements of ASO Deception in Google Play via Mobile and App Usage
- **Authors:** Authors: Nestor Hernandez, Ruben Recabarren, Bogdan Carbunar, Syed Ishti…
-
What's the point of AI that cant code any kind of hacking even when ethical and being performed on your own network for research? these ristrictions should be removed
here an example of what im am …
-
> Another area I started looking into (but haven't deeply explored yet) for both figuring out how to map variable names to sections of code in a 'smart' way, and potentially also for module identifica…
-
## Keyword: metric learning
### ShufaNet: Classification method for calligraphers who have reached the professional level
- **Authors:** Ge Yunfei, Diao Changyu, Li Min, Yu Ruohan, Qiu Linshan, Xu…
-
## Feature Request
### Description of Problem:
We need to understand the value of the MITRE ATT&CK framework to justify its adoption within CCC as part of threat-informed assessments of cloud serv…