Posts
2024 - 12
-    Advancements in Adversarial Attacks on Malware Detection Advancements in Adversarial Attacks on Malware Detection
-    Advancements in Differentially Private Decentralized Optimization Techniques Advancements in Differentially Private Decentralized Optimization Techniques
-    Analysis of RiseLoader Malware and Cybersecurity Implications Analysis of RiseLoader Malware and Cybersecurity Implications
-    ASCON Cipher Vulnerabilities Identified in Security Study ASCON Cipher Vulnerabilities Identified in Security Study
-    AWS KMS Key Management Strategies for Cloud Security AWS KMS Key Management Strategies for Cloud Security
-    Cleo File Transfer Software Vulnerabilities Identified Cleo File Transfer Software Vulnerabilities Identified
-    GitLab Issues Advisory on Software Vulnerabilities GitLab Issues Advisory on Software Vulnerabilities
-    Impact Tracing Method Developed to Address Misinformation Impact Tracing Method Developed to Address Misinformation
-    Investigation Reveals New PHP Backdoor Named Glutton Investigation Reveals New PHP Backdoor Named Glutton
-    Large Language Models Enhance Detection of Malicious npm Packages Large Language Models Enhance Detection of Malicious npm Packages
-    Machine Learning Framework Developed for Smishing Detection Machine Learning Framework Developed for Smishing Detection
-    MalMixer Introduces Few-Shot Malware Classification Method MalMixer Introduces Few-Shot Malware Classification Method