unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Evaluating ADA: Experimental Results on Linear and Housing Datasets
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-15 03:30:44 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
ada
zurich
mixup
switzerland
How to Implement ADA for Data Augmentation in Nonlinear Regression Models
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-15 03:30:35 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
zurich
switzerland
swiss
nonlinear
regressor
Anchor Data Augmentation as a Generalized Variant of C-Mixup
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-15 03:30:23 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
zurich
switzerland
swiss
perez
Anchor Data Augmentation (ADA): A Domain-Agnostic Method for Enhancing Regression Models
Authors:(1) Nora Schneider, Computer Science Department, ETH Zurich, Zurich, Switzerland ([email p...
2024-11-15 03:30:6 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
zurich
anchor
switzerland
ada
Is SOAR Obsolete?
You may have heard that SOAR is dead. Vendors have become afraid of the term, repositioning thei...
2024-11-15 03:10:9 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
soar
security
d3
obsolete
Malware being delivered by mail, warns Swiss cyber agency
Switzerland’s Federal Office for Cybersecurity (OFCS) issued a warning on Wednesday about “fake let...
2024-11-15 02:15:58 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
ofcs
qr
letter
fraudulent
letters
How to Defend Non-Human Identities from Infostealers
Infostealers are getting bolder – and more ambitious.Long focused on stealing human credentials –...
2024-11-15 02:6:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
workloads
identities
cloud
attackers
微软 Windows Server 2025 LTSC 最新正式版官方 ISO 镜像下载 - 服务器系统 MSDN 原版
系统工具 Windows 2024-11-1511.11 软件打折会场 | 百度网盘年卡¥179 | 夸克网盘¥119 | WPS 会员6年 | QQ音乐¥11...
2024-11-15 02:2:53 | 阅读: 6 |
收藏
|
异次元软件世界 - www.iplaysoft.com
windows
安全
数据
安全性
网络
Blinded by Silence
Blinded by Silence: How Attackers Disable EDROverviewEndpoint Detection and Response systems...
2024-11-15 02:2:47 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
windows
edrsilencer
wfp
microsoft
Essential Linux Security Practices — Part 2
2024-11-15 02:1:50 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Dark Web Scraping Using AI : Tools, Techniques, and Challenges
2024-11-15 02:1:45 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Cybersecurity 101: Specializations & Job roles — Part I
2024-11-15 02:1:37 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
How to Effectively Assess the Security of Your Apps
2024-11-15 02:0:53 | 阅读: 2 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Cracking ATO via Email HTML Injection
2024-11-15 02:0:42 | 阅读: 6 |
收藏
|
Bug Bounty in InfoSec Write-ups on Medium - infosecwriteups.com
Cracking ATO via Email HTML Injection
2024-11-15 02:0:42 | 阅读: 4 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
TryHackMe - SeeTwo
2024-11-15 02:0:37 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
The Story of Finding and Mitigating CVE-2021–42063 Vulnerability in Lenovo’s SAP Knowledge…
2024-11-15 02:0:31 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
T(ROP)H: Thread Hijacking with ROP
2024-11-15 02:0:25 | 阅读: 3 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Oski Lab: Cyber Defenders Write-up
2024-11-15 02:0:19 | 阅读: 1 |
收藏
|
InfoSec Write-ups - Medium - infosecwriteups.com
Randall Munroe’s XKCD ‘Geometriphylogenetics’
via the c...
2024-11-15 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
munroe
creator
permalink
authored
Previous
79
80
81
82
83
84
85
86
Next