Tags
Random
Security
ComputerScience
SoftwareEngineering
InformationTheory
GraphTheory
Statistics
Calculus
LinearAlgebra
Chemistry
NumberTheory
MachineLearning
Networks
DataScience
Psychology
Biology
Random
On the AI Hype
System Design, Culture, and Philosophy
Banning Web-Based Services Wouldn't Work
Why Reading Matters
Accidental Software Engineer
Security
PPT Framework in Software Engineering
Make Compliance Great Again
Quantum Supremacy and Key Pairs
TP-Link Wireless Router ARP List Monitoring
Compromised Network Traffic Analysis
Scan Durations of Different Nmap Scan Techniques
Lattice and Lattice-Based Access Control
VulnHub unknowndevice64 Writeup
Getting Certified
What Do Hackers Do?
Thinking About Security
Understanding Denial of Service Attacks
VulnHub Zico2 Writeup
VulnHub LazySysAdmin Writeup
Attending Black Hat Asia 2017
Indonesian Startup Cyber Crime 2016
Tokopedia Persisted XSS Vulnerability
VulnHub HackDay Albania Writeup
One Year of a Bug Bounty Program
Orami Insecure Cookie Flagging
VulnHub Necromancer Writeup
Safe Redirect Gem for Rails
Vulnerability on Plurk Android Apps
Social Media Login Vulnerability
A Web Agency's Vulnerable Website
VulnHub FristiLeaks Writeup
VulnHub Freshly Solution
Jualo User Bio XSS
Tokopedia DoS Vulnerability
ComputerScience
On the AI Hype
arXiv Paper Authors Relation Graph
ISP Uptime Checker Util
Basic Concepts of Word Embedding
Matrix Operations and Neural Networks
Restricted Boltzmann Machine
Lattice and Lattice-Based Access Control
Tic-Tac-Toe AI Opponent with Set and Probability
Cross-Entropy and Kullback-Leibler Divergence
Shannon Entropy and Uncertainty of Information
Image Processing Convolution Kernels
Optimizing a Recommendation Engine
SoftwareEngineering
On the AI Hype
Learning as a Software Engineer
Setting Up a Self-Sustaining System
PPT Framework in Software Engineering
Bayesian Networks for Reliability Analysis
A Critique of Growth Hack-Driven Development
System Design, Culture, and Philosophy
ISP Uptime Checker Util
Autoencoder Neural Network Architecture
Tic-Tac-Toe AI Opponent with Set and Probability
The Journey to Invincibility
Making the Right Technical Decision
Improving Yourself as an Engineer
Docker-Based Ansible Testing Environment
Basic Auth: Authentication or Authorization?
Social Responsibility of Tech Companies
Safe Redirect Gem for Rails
Frekwenza: Another Ruby TF-IDF Gem
Optimizing a Recommendation Engine
InformationTheory
Cross-Entropy and Kullback-Leibler Divergence
Shannon Entropy and Uncertainty of Information
Statistics
Bayesian Networks for Reliability Analysis
Scan Durations of Different Nmap Scan Techniques
Autocorrelation: ACF and PACF
Calculating and Validating Granger Causality
Autoregressive Model and Moving Average in Time Series Analysis
Principal Component Analysis
Bayesian Statistics and Naive Bayes Classifiers
Gamma Distribution, Poisson Process, and Gamma Function
Hazard Function in Survival Analysis
Weibull Distribution
Exponential Distribution
Basic Concepts on Statistical Hypothesis Testing
From Raw and Central Moments to Standardized Moment
Binomial Distribution and Hypergeometric Distribution
Deriving Poisson Probability Function from Binomial Distribution
LinearAlgebra
Adjacency Matrix in Graph Theory
Matrix Operations and Neural Networks
Matrix Eigendecomposition
Singular Value Decomposition
Moore-Penrose Inverse
Vector Operations
Chemistry
Revisiting Alkali Metals
NumberTheory
Riemann Zeta Function
MachineLearning
Basic Concepts of Word Embedding
Autoencoder Neural Network Architecture
Matrix Operations and Neural Networks
Restricted Boltzmann Machine