3Database leakage/SQL injection detection through poison records (opens in new tab)(cossacklabs.com)2praxis237y ago0
4A Linux Auditd Rule Set Mapped to MITRE's Attack Framework (opens in new tab)(github.com)51praxis237y ago1
5Current trends and challenges in post-quantum cryptography [pdf] (opens in new tab)(math.auckland.ac.nz)2praxis237y ago0
14Explaining Zero Knowledge Protocols with Halloween Candy (opens in new tab)(medium.com)5praxis238y ago0