student_cooperation: Student cooperation (2012)
Network of cooperation among students in the "Computer and Network Security" course at Ben-Gurion University, in 2012. Nodes are students, and edges denote cooperation between students while doing their homework. The graph contains three types of links: Time, Computer, Partners.
This network has 185 nodes and 360 edges.
Tags: Social, Offline, Multigraph, Unweighted
GRPO-GCC: Enhancing Cooperation in Spatial Public Goods Games via Group Relative Policy Optimization with Global Cooperation Constraint
Zhaoqilin Yang, Chanchan Li, Tianqi Liu, Hongxin Zhao, Youliang Tian
https://arxiv.org/abs/2510.08607
Germany summons Russian ambassador over cyberattack, election disinformation https://therecord.media/germany-summons-russian-ambassador-cyberattack-disinformation
The UK proposes laws to protect public services from cyberattacks, including regulating companies providing services to private and public sector organizations (Catarina Demony/Reuters)
https://www.reuters.com/world/uk/uk-plans-tougher-…
"The effort focused on dozens of targets and involved a level of automation that Anthropic’s cybersecurity investigators had not previously seen"
Chinese Hackers Used Anthropic’s AI to Automate Cyberattacks
https://www.wsj.com/tech/ai/china-hackers-
Cobordism maps in Khovanov homology and singular instanton homology II
Hayato Imori, Taketo Sano, Kouki Sato, Masaki Taniguchi
https://arxiv.org/abs/2510.09399 https://
Welcome back - been busy the last days with meeting friends etc 🙂
But I wanted to show some more #photos from the #Lotharsteig in the #nationalparkschwarzwald . Different from …
ConPoSe: LLM-Guided Contact Point Selection for Scalable Cooperative Object Pushing
Noah Steinkr\"uger, Nisarga Nilavadi, Wolfram Burgard, Tanja Katharina Kaiser
https://arxiv.org/abs/2510.08705
Man, today's Metacurity is packed with tons of critical infosec developments you should know, including
--Google sues Chinese smishing giant Lighthouse Enterprise for scams across 120 countries,
--UK proposes new cyberattack defenses,
--UK to allow tests of AI systems to gauge CSAM potential,
--Oz spy chief says China probed country's telecom networks,
--China blames US gov't for $13B LuBian theft,
--Google unveils Private AI Compute,
--M…
Sources: The Trump administration is drafting a new cyber strategy that would enlist private companies to mount offensive cyberattacks on foreign adversaries (Jamie Tarabay/Bloomberg)