REx: Rule Explorer project and Detection Engineering Threat Report (DETR) If you found LoFP from http://lolol.farm useful, this provides significantly more insights via a much more powerful platform (built on the Elastic stack!) CC: @br0k3ns0und #elastic #threatradar #threatintelligence #edr #detection #threat
ThreatRadar’s Post
More Relevant Posts
-
MultiDump - Post-Exploitation Tool For Dumping And Extracting LSASS Memory Discreetly https://lnkd.in/d3r93MEK
To view or add a comment, sign in
-
New Post: UDP Amplification Scanner - https://lnkd.in/dNaeZXFi
To view or add a comment, sign in
-
A much-awaited read on “pre-signatures” in MPC-Threshold Signatures by our Principal Scientist which sets the context on offline-online paradigm and much appreciated speed gains in TSS. Much like other MPC protocols, many threshold ECDSA protocols support different modes of operation, like the offline-online paradigm. The article touches upon the security implications of Pre-signing in Threshold ECDSA, pipelining, additive key derivation, and raw signing. https://lnkd.in/dgvJRmQk
Threshold ECDSA Modes of Operation: Pre-signing and More
medium.com
To view or add a comment, sign in
-
This article investigates an impactful, first of its kind adversarial attack that can be launched by exploiting the malicious #Minimization of #Drive #Test (#MDT) reports from the compromised #user #equipment (#UE). The authors highlight the detrimental repercussions of this attack on the performance of common network automation functions. They also propose a novel Malicious #MDT #Reports #Identification #framework (#MRIF) as a countermeasure to detect and eliminate the malicious MDT reports using Machine Learning and verify it through a use case. ---- Aneeqa Ijaz, Waseem Raza More details can be found at this link: https://lnkd.in/gTiHtrAn
An AI-Enabled Framework to Defend Ingenious MDT-Based Attacks on the Emerging Zero Touch Cellular Networks
ieeexplore.ieee.org
To view or add a comment, sign in
-
Founder & CEO at Skrots | Intel Software Innovator at Intel | Expert in AI, VR, Game Dev, IoT, Web & Mobile, Digital Marketing, SEO SMM, FinTech, and Blockchain
Here is my latest blog about: The best way to Clone an Current Digital Machine? - https://lnkd.in/gg5PF5Yf Introduction The aim of this text is to explain the method of cloning an current VM and creating a brand new VM. Pre-requisites Subscription contributor Implementation steps Go to the VM that you might want to clone and click on on Disks, as proven beneath. Click on on the OsDisk and Click on on "+ Create snapshot". Present the knowledge as proven within the beneath screenshot. Select the benea... Do Like & Share :)
To view or add a comment, sign in
-
How robust are Mamba architectures compared to ConvNets and ViTs? We rigorously evaluate and compare their robustness against occlusions, natural corruptions, and adversarial attacks. Paper: https://lnkd.in/dhnq_Fr9 Code: https://lnkd.in/dsvCVum2 𝐒𝐮𝐦𝐦𝐚𝐫𝐲 𝐨𝐟 𝐨𝐮𝐫 𝐞𝐱𝐩𝐞𝐫𝐢𝐦𝐞𝐧𝐭𝐬: 𝟏- 𝑂𝑐𝑐𝑙𝑢𝑠𝑖𝑜𝑛𝑠 𝑎𝑛𝑑 𝐼𝑛𝑓𝑜𝑟𝑚𝑎𝑡𝑖𝑜𝑛 𝐿𝑜𝑠𝑠: VSSMs outperform ConvNets and perform comparably to ViTs in handling partial information loss due to occlusions, especially in scenarios with random, salient, and non-salient patch drops. 𝟐- 𝐶𝑜𝑚𝑚𝑜𝑛 𝐶𝑜𝑟𝑟𝑢𝑝𝑡𝑖𝑜𝑛𝑠: For global corruptions, VSSMs show low performance relative to ViTs & ConvNets. However, under fine-grained corruptions, VSSMs either match or surpass the performance of ConvNets and ViTs, particularly in dense prediction tasks (detection & segmentation). 𝟑- 𝐴𝑑𝑣𝑒𝑟𝑠𝑎𝑟𝑖𝑎𝑙 𝐴𝑡𝑡𝑎𝑐𝑘𝑠: In adversarial settings, smaller VSSM models display greater resilience to both white-box and black-box attacks. However, their performance declines with high-frequency adversarial perturbations, where ViTs generally perform better. Kudos to the team: Hashmat Shadab Malik, Fahad Shamshad, Muzammal Naseer, Karthik Nandakumar, Fahad Khan
To view or add a comment, sign in
-
أسعى لتحقيق الديموقراطية في تداول المعلومات العلمية والحيوية للأنظمة والمجتمعات من أجل مستقبل مشرق للجميع
Input: https://lnkd.in/gugP3-TB The Holistic algorithm:
To view or add a comment, sign in
-
7- Inverse Algorithms: These algorithms are used to find the required inputs to achieve a specific output.
To view or add a comment, sign in
-
This article demonstrates the operation of an #LTspice shift register and discusses details of its schematic and timing relationships. https://bit.ly/3WhDt52
Moving Data Through an LTspice Parallel-Load Shift Register - Technical Articles
allaboutcircuits.com
To view or add a comment, sign in
-
How we set the #RISCV Interrupt Priority and Threshold for Platform-Level Interrupt Controller (PLIC) Article: https://lnkd.in/grvprA_9 Continues here: https://lnkd.in/gSUFAWzW
To view or add a comment, sign in
3,507 followers
Cyber Security Lead Asia Pacific India at Hewlett-Packard Enterprise
1moUseful tips