3Database leakage/SQL injection detection through poison records (opens in new tab)cossacklabs.com2praxis237y ago0
4A Linux Auditd Rule Set Mapped to MITRE's Attack Framework (opens in new tab)github.com51praxis237y ago1
5Current trends and challenges in post-quantum cryptography [pdf] (opens in new tab)math.auckland.ac.nz2praxis237y ago0
14Explaining Zero Knowledge Protocols with Halloween Candy (opens in new tab)medium.com5praxis238y ago0