all InfoSec news
Topic: literature
Scaling Lattice Sieves across Multiple Machines
1 week, 6 days ago |
www.iacr.org
When LLMs Meet Cybersecurity: A Systematic Literature Review
3 weeks, 5 days ago |
arxiv.org
Cyber Security in Energy Informatics: A Non-technical Perspective
3 weeks, 6 days ago |
arxiv.org
Towards Building a Robust Toxicity Predictor
1 month, 2 weeks ago |
arxiv.org
Watermark-based Detection and Attribution of AI-Generated Content
1 month, 3 weeks ago |
arxiv.org
Maryse Conde: Daring storyteller who explored black identity
1 month, 4 weeks ago |
www.digitaljournal.com
DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research
2 months, 2 weeks ago |
arxiv.org
Collaborative Cybersecurity Using Blockchain: A Survey
2 months, 3 weeks ago |
arxiv.org
Deployment Challenges of Industrial Intrusion Detection Systems
2 months, 3 weeks ago |
arxiv.org
Training generative models from privatized data
2 months, 4 weeks ago |
arxiv.org
Mean estimation in the add-remove model of differential privacy
3 months, 1 week ago |
arxiv.org
Systematic Literature Review of EM-SCA Attacks on Encryption
3 months, 2 weeks ago |
arxiv.org
The current state of security -- Insights from the German software industry
3 months, 2 weeks ago |
arxiv.org
Towards Biologically Plausible and Private Gene Expression Data Generation
3 months, 3 weeks ago |
arxiv.org
(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths
4 months, 3 weeks ago |
www.trustwave.com
What Controls are Required for SOC 2 Reports?
5 months, 2 weeks ago |
cloudsecurityalliance.org
Asymptotics of hybrid primal lattice attacks
5 months, 3 weeks ago |
www.iacr.org
Blockchain Governance via Sharp Anonymous Multisignatures
5 months, 3 weeks ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Scaling Lattice Sieves across Multiple Machines
1 week, 6 days ago |
www.iacr.org
When LLMs Meet Cybersecurity: A Systematic Literature Review
3 weeks, 5 days ago |
arxiv.org
Cyber Security in Energy Informatics: A Non-technical Perspective
3 weeks, 6 days ago |
arxiv.org
Towards Building a Robust Toxicity Predictor
1 month, 2 weeks ago |
arxiv.org
Watermark-based Detection and Attribution of AI-Generated Content
1 month, 3 weeks ago |
arxiv.org
Maryse Conde: Daring storyteller who explored black identity
1 month, 4 weeks ago |
www.digitaljournal.com
DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research
2 months, 2 weeks ago |
arxiv.org
Collaborative Cybersecurity Using Blockchain: A Survey
2 months, 3 weeks ago |
arxiv.org
Deployment Challenges of Industrial Intrusion Detection Systems
2 months, 3 weeks ago |
arxiv.org
Training generative models from privatized data
2 months, 4 weeks ago |
arxiv.org
Mean estimation in the add-remove model of differential privacy
3 months, 1 week ago |
arxiv.org
Systematic Literature Review of EM-SCA Attacks on Encryption
3 months, 2 weeks ago |
arxiv.org
The current state of security -- Insights from the German software industry
3 months, 2 weeks ago |
arxiv.org
Towards Biologically Plausible and Private Gene Expression Data Generation
3 months, 3 weeks ago |
arxiv.org
(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths
4 months, 3 weeks ago |
www.trustwave.com
What Controls are Required for SOC 2 Reports?
5 months, 2 weeks ago |
cloudsecurityalliance.org
Asymptotics of hybrid primal lattice attacks
5 months, 3 weeks ago |
www.iacr.org
Blockchain Governance via Sharp Anonymous Multisignatures
5 months, 3 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC