Evolution of the Unix System Architecture: An Exploratory Case Study

Evolution of the Unix System Architecture: An Exploratory Case Study

A Review of Physics Simulators for Robotic Applications

Reverse Engineering of Intel Microcode Update Structure

Engineering Impacts of Anonymous Author Code Review: A Field Experiment

100-GHz Single-Flux-Quantum Bit-Serial Adder Based on 10-KA/Cm2 Niobium Process

Researchers analyzed millions of Twitter bios and found that Americans are adding political words to their bios at a higher rate than any other category of words measured

Revelio: A MimbleWimble Proof of Reserves Protocol

Ransomware: Anti-virus unable to detect it

Dangerous Ransomware Technique

The Origin of the “MIT License”

New powerful malware obfuscation technique

Covid-19 Artificial Intelligence Diagnosis using only Cough Recordings

COVID-19 Artificial Intelligence Diagnosis using only Cough Recordings — For asymptomatic subjects, it achieves sensitivity of 100% with specificity of 83.2%

Supercomputing on Nitro in AWS Cloud

Dynamic branch prediction using neural networks (2001)

A CFI Countermeasure Against GOT Overwrite Attacks

The LISP 2 Project

Is Nuclear Power Globally Scalable?

A study of r/KotakuInAction finds a shift in topics away from gaming and activism toward broader complaints about social justice

Helix: Unsupervised Grammar Induction for Structured Activity Recognition

A Survey of Research on Runtime Rerandomization Under Memory Disclosure

DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software

A Hardware Accelerator for Tracing Garbage Collection

Leakage Is Prohibited: Memory Protection Extensions Protected Address Space Randomization

Covert channel attacks in pervasive computing

Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication (pdf)

Intellectual Control

HW-CDI: Hard-Wired Control Data Integrity

Detection of cyberbullying with the aid of deep learning method.

More →