all InfoSec news
Topic: literature
Towards Building a Robust Toxicity Predictor
1 week, 3 days ago |
arxiv.org
Watermark-based Detection and Attribution of AI-Generated Content
2 weeks, 4 days ago |
arxiv.org
Maryse Conde: Daring storyteller who explored black identity
3 weeks, 3 days ago |
www.digitaljournal.com
Machine Learning on Blockchain Data: A Systematic Mapping Study
4 weeks, 2 days ago |
arxiv.org
Collaborative Cybersecurity Using Blockchain: A Survey
1 month, 2 weeks ago |
arxiv.org
Deployment Challenges of Industrial Intrusion Detection Systems
1 month, 3 weeks ago |
arxiv.org
Training generative models from privatized data
1 month, 3 weeks ago |
arxiv.org
Systematic Literature Review of EM-SCA Attacks on Encryption
2 months, 1 week ago |
arxiv.org
The current state of security -- Insights from the German software industry
2 months, 1 week ago |
arxiv.org
Towards Biologically Plausible and Private Gene Expression Data Generation
2 months, 2 weeks ago |
arxiv.org
(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths
3 months, 2 weeks ago |
www.trustwave.com
What Controls are Required for SOC 2 Reports?
4 months, 1 week ago |
cloudsecurityalliance.org
Asymptotics of hybrid primal lattice attacks
4 months, 2 weeks ago |
www.iacr.org
Blockchain Governance via Sharp Anonymous Multisignatures
4 months, 2 weeks ago |
www.iacr.org
Gotta Catch 'em All: Aggregating CVSS Scores. (arXiv:2310.02062v1 [cs.CR])
6 months, 3 weeks ago |
arxiv.org
A Total Break of the Scrap Digital Signature Scheme
6 months, 3 weeks ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Towards Building a Robust Toxicity Predictor
1 week, 3 days ago |
arxiv.org
Watermark-based Detection and Attribution of AI-Generated Content
2 weeks, 4 days ago |
arxiv.org
Maryse Conde: Daring storyteller who explored black identity
3 weeks, 3 days ago |
www.digitaljournal.com
Machine Learning on Blockchain Data: A Systematic Mapping Study
4 weeks, 2 days ago |
arxiv.org
Collaborative Cybersecurity Using Blockchain: A Survey
1 month, 2 weeks ago |
arxiv.org
Deployment Challenges of Industrial Intrusion Detection Systems
1 month, 3 weeks ago |
arxiv.org
Training generative models from privatized data
1 month, 3 weeks ago |
arxiv.org
Systematic Literature Review of EM-SCA Attacks on Encryption
2 months, 1 week ago |
arxiv.org
The current state of security -- Insights from the German software industry
2 months, 1 week ago |
arxiv.org
Towards Biologically Plausible and Private Gene Expression Data Generation
2 months, 2 weeks ago |
arxiv.org
(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths
3 months, 2 weeks ago |
www.trustwave.com
What Controls are Required for SOC 2 Reports?
4 months, 1 week ago |
cloudsecurityalliance.org
Asymptotics of hybrid primal lattice attacks
4 months, 2 weeks ago |
www.iacr.org
Blockchain Governance via Sharp Anonymous Multisignatures
4 months, 2 weeks ago |
www.iacr.org
Gotta Catch 'em All: Aggregating CVSS Scores. (arXiv:2310.02062v1 [cs.CR])
6 months, 3 weeks ago |
arxiv.org
A Total Break of the Scrap Digital Signature Scheme
6 months, 3 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)
@ Experian | ., ., United States
IT Security Specialist
@ Ørsted | Kuala Lumpur, MY
Senior, Cyber Security Analyst
@ Peloton | New York City
Cyber Security Engineer | Perimeter | Firewall
@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania
Pentester / Ethical Hacker Web/API - Vast/Freelance
@ Resillion | Brussels, Belgium