Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_csAI_bot@mastoxiv.page
2025-06-03 07:20:25

A "Wenlu" Brain System for Multimodal Cognition and Embodied Decision-Making: A Secure New Architecture for Deep Integration of Foundation Models and Domain Knowledge
Liang Geng
arxiv.org/abs/2506.00570

@Dragofix@veganism.social
2025-06-02 23:04:43

Urge Coach to Stop Selling Leather #AnimalRights

@arXiv_csCR_bot@mastoxiv.page
2025-06-04 07:20:38

Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
Raj Patel, Himanshu Tripathi, Jasper Stone, Noorbakhsh Amiri Golilarz, Sudip Mittal, Shahram Rahimi, Vini Chaudhary
arxiv.org/abs/2506.02032

@profcarroll@federate.social
2025-05-03 19:16:47

Now that most services have implemented 2FA (multi-factor authentication) we are seeing a new breed of scams that exploit them and trick people into approving requests under the guise of fraud prevention, which is easy to do now that we are bombarded by more secure logins. The next time you get a fraud prevention alert, be quadruple vigilant about how you respond to 2FA requests.

@lysander07@sigmoid.social
2025-06-03 07:48:26

From this year on, ESWC will be under the umbrella of SWSA, the Semantic Web Science Association, to secure financial sustainability for the upcoming years after its previous supporting organisation STI was dissolved in 2023. Basics about the transition are given by Elena Simperl, president of SWSA.
swsa.semanticweb.org/

The image shows a presentation slide titled "ESWC[@]SWSA" displayed on a large screen. The slide outlines the oversight rules that SWSA will follow with ESWC, similar to those at ISWC. The text includes bullet points detailing the roles and responsibilities, such as inviting the general chair, approving program chairs, and holding town hall meetings for improvement. It also mentions the transparent process for appointing local hosts, using profits for sustainability, and ensuring the conference…

This is going to be a different type of campaign.
Because when you’re going after Medicaid and even ripping food away from hungry kids,
all to cut taxes for donors and corporate lobbyists,
we’re not pulling punches.
I hope you’ll join us:
secure.actblue.com/donate/loc_…

@profcarroll@federate.social
2025-05-03 19:16:47

Now that most services have implemented 2FA (multi-factor authentication) we are seeing a new breed of scams that exploit them and trick people into approving requests under the guise of fraud prevention, which is easy to do now that we are bombarded by more secure logins. The next time you get a fraud prevention alert, be quadruple vigilant about how you respond to 2FA requests.

@arXiv_quantph_bot@mastoxiv.page
2025-06-02 10:39:28

This arxiv.org/abs/2505.17502 has been replaced.
initial toot: mastoxiv.page/@arXiv_qu…

@arXiv_csCR_bot@mastoxiv.page
2025-06-04 13:39:44

This arxiv.org/abs/2505.23655 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csDC_bot@mastoxiv.page
2025-06-04 13:33:17

This arxiv.org/abs/2410.02544 has been replaced.
initial toot: mastoxiv.page/@arXiv_csDC_…

@arXiv_csSE_bot@mastoxiv.page
2025-06-04 07:41:53

A Preference-Driven Methodology for High-Quality Solidity Code Generation
Zhiyuan Peng, Xin Yin, Chenhao Ying, Chao Ni, Yuan Luo
arxiv.org/abs/2506.03006

@arXiv_csIT_bot@mastoxiv.page
2025-06-03 16:06:08

This arxiv.org/abs/2406.06842 has been replaced.
initial toot: mastoxiv.page/@arXiv_csIT_…

@markhburton@mstdn.social
2025-06-02 16:30:10

Conclusions from the excellent #AlternativeDefenceReview
cnduk.org/wp-content/uploads/2

WE NEED:
A. a significant
reduction in military
expenditure (within
a framework of Just
Transition)
B. to fully implement the
policies of the United
Nations and Global
South on climate
change
C. to use our influence
to secure speedy
resolution of existing
conflicts in Ukraine
and the Middle East;
and to de-escalate
tension in the Pacific
D. to oppose attempts to
create new theatres of
military conflict
E. to immediately halt
arms exports to
governments engaged
in active conflict or
serious huma…
@arXiv_eessSP_bot@mastoxiv.page
2025-06-03 07:42:58

Integrated Sensing, Computing and Semantic Communication for Vehicular Networks
Yinchao Yang, Zhaohui Yang, Chongwen Huang, Wei Xu, Zhaoyang Zhang, Dusit Niyato, Mohammad Shikh-Bahaei
arxiv.org/abs/2506.00522

@arXiv_csMM_bot@mastoxiv.page
2025-06-03 16:07:27

This arxiv.org/abs/2504.02640 has been replaced.
initial toot: mastoxiv.page/@arXiv_csMM_…

@arXiv_eessSY_bot@mastoxiv.page
2025-06-04 07:36:21

Recursive Privacy-Preserving Estimation Over Markov Fading Channels
Jie Huang, Fanlin Jia, Xiao He
arxiv.org/abs/2506.02725

@arXiv_csCR_bot@mastoxiv.page
2025-06-04 13:38:02

This arxiv.org/abs/2505.00849 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csNI_bot@mastoxiv.page
2025-06-04 07:24:44

Experimental Covert Communication Using Software-Defined Radio
Rohan Bali, Trevor E. Bailey, Michael S. Bullock, Boulat A. Bash
arxiv.org/abs/2506.02297

@khalidabuhakmeh@mastodon.social
2025-05-29 12:44:40

Hey, you #JavaScript folks want to build #secure web experiences? Well, join us on this #livestream where we talk about the best current practice of Backend For Frontend to keep your apps safe from…

@jdrm@social.linux.pizza
2025-05-30 13:29:01

Me gustó mucho la herramienta de cifrado de ficheros age github.com/FiloSottile/age y me puse a hacer un pequeño script para poder cifrar directorios de forma recursiva, desencriptarlos, tener definidas varias bóvedas en distintos ficheros de variables para poder descifrar unos u otros...…

@arXiv_csAI_bot@mastoxiv.page
2025-06-03 07:16:36

The Automated but Risky Game: Modeling Agent-to-Agent Negotiations and Transactions in Consumer Markets
Shenzhe Zhu, Jiao Sun, Yi Nian, Tobin South, Alex Pentland, Jiaxin Pei
arxiv.org/abs/2506.00073

@arXiv_csCR_bot@mastoxiv.page
2025-06-03 17:49:58

This arxiv.org/abs/2505.00858 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@egallager@social.treehouse.systems
2025-05-27 00:44:35

Reminder that my shared ActBlue fundraising form is still live: #NHPolitics

@arXiv_csAI_bot@mastoxiv.page
2025-06-03 08:08:47

COALESCE: Economic and Security Dynamics of Skill-Based Task Outsourcing Among Team of Autonomous LLM Agents
Manish Bhatt, Ronald F. Del Rosario, Vineeth Sai Narajala, Idan Habler
arxiv.org/abs/2506.01900

@metacurity@infosec.exchange
2025-05-29 10:41:27

Inside bunker where ‘cyberspies’ shield aircraft carrier from Iran
thetimes.com/uk/defence/articl

@mot@chaos.social
2025-04-29 18:09:37

Das Secure Mobile Networking Lab (SEEMOO) @… der @… hat zwei richtig tolle Open Source Apps entwickelt:
AirGuard für Android und iOS scannt regelmäßig (oder manuell) nach Tracking Tags wie z. B. Apple AirTags und kann so Stalking Tools si…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:16:29

Zero-Trust Foundation Models: A New Paradigm for Secure and Collaborative Artificial Intelligence for Internet of Things
Kai Li, Conggai Li, Xin Yuan, Shenghong Li, Sai Zou, Syed Sohail Ahmed, Wei Ni, Dusit Niyato, Abbas Jamalipour, Falko Dressler, Ozgur B. Akan
arxiv.org/abs/2505.23792

@jonippolito@digipres.club
2025-04-24 11:52:18

PDFs had a rough month, with one study crediting them for 15% of cyberattacks and Meta flubbing PDF redactions to leak rivals’ secrets in court. It's possible to make PDFs secure but easy to get burned linkedin.com/posts/jonippolito…

A slide from Meta’s antitrust trial showing black rectangles over private information and then the same slide with the redacted information revealed.

Jon Ossof's fundraising has slowed dramatically since Marjorie Taylor Greene said she wasn't running.
And Republicans are ramping up their attacks and their spending against Jon.
The timing is not great, to say the least.
You made your last donation to Jon Ossoff in 2020 -- Thank you for that.
But if we are going to reach our goals and defend this seat, Jon needs you one more time.
Can you do it? For Jon? To hold this seat?
Please use this link …

@arXiv_quantph_bot@mastoxiv.page
2025-06-02 07:36:43

Realistic quantum network simulation for experimental BBM92 key distribution
Michelle Chalupnik, Brian Doolittle, Suparna Seshadri, Eric G. Brown, Keith Kenemer, Daniel Winton, Daniel Sanchez-Rosales, Matthew Skrzypczyk, Cara Alexander, Eric Ostby, Michael Cubeddu
arxiv.org/abs/2505.24851

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:18:09

The Cost of Restaking vs. Proof-of-Stake
Akaki Mamageishvili, Benny Sudakov
arxiv.org/abs/2505.24440 arxiv.org/pdf/25…

@michabbb@social.vivaldi.net
2025-05-29 19:32:54

#5 🧾 Validate file uploads with proper size, type and filename sanitization
🍪 Configure secure cookie settings with httpOnly and sameSite attributes
📈 Implement rate limiting to prevent brute force and #DDoS attacks

@rae@bne.social
2025-04-29 03:26:25

Dangerous waters - According to Media Watch, "Austen Tayshus" has since last year received more than 90 minutes of airtime on ABC local radio over 11 segments,

@siggib@infosec.exchange
2025-03-27 09:50:28

Today's pondering: Once you start getting begbounties, does that mean you're site is easy to find and secure enough that the only thing to find are info-level issues, or are those engaging in begbounties so incompetent that info-level issues are the only thing they are able to find?

@veit@mastodon.social
2025-04-16 10:46:06

🥳 Hooray – the CVE Foundation has been set up to secure the future of the CVE programme: #ITSecurity

@ian@phpc.social
2025-05-26 23:59:53

Folks using PHP don't relize how good we have it for things like "a nice datetime built-in" and "reasonably secure defaults on password generation and randomness."
And the three things I mentioned above have been around since 2006, 2013, and 2015, respectively.

@geant@mstdn.social
2025-04-25 13:06:16

🚀 Opening new frontiers with the first major in-the-field demo of practical quantum communications!
Read in the latest issue of the Nature Magazine about the first practical demonstration of Quantum Key Distribution (QKD) within commercial telecom networks - a breakthrough in the field, achieved by a team from Toshiba Europe, GÉANT, PSNC, and Anglia Ruskin University.
A major step towards a scalable, secure, and practical quantum internet.
Learn more:

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:17:32

Synopsis: Secure and private trend inference from encrypted semantic embeddings
Madelyne Xiao, Palak Jain, Micha Gorelick, Sarah Scheffler
arxiv.org/abs/2505.23880

@arXiv_csIT_bot@mastoxiv.page
2025-05-30 09:53:30

This arxiv.org/abs/2401.13980 has been replaced.
initial toot: mastoxiv.page/@arXiv_csIT_…

@HugeGameArtGD@mastodon.gamedev.place
2025-05-24 14:12:45

keyoxide.org/98bab9c9673825f38

@arXiv_csCE_bot@mastoxiv.page
2025-05-30 09:50:16

This arxiv.org/abs/2404.00306 has been replaced.
link: scholar.google.com/scholar?q=a

@arXiv_csCR_bot@mastoxiv.page
2025-06-04 13:37:17

This arxiv.org/abs/2504.16571 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csOS_bot@mastoxiv.page
2025-05-28 10:11:51

This arxiv.org/abs/2501.06234 has been replaced.
initial toot: mastoxiv.page/@arXiv_csOS_…

In Poland’s golden hour, a looming threat to Europe’s unity
Across Europe’s newest economic powerhouse,
where living standards have leapfrogged Japan’s and are on course to surpass Spain’s and Israel’s,
incomes are surging, shops are buzzing and borders are secure
— at least for now.

Poland, once a dreary outback in Cold War communism’s slough of despond, is now in Europe’s first rank in economic, diplomatic, military and political terms.
Situated in Cent…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 10:13:02

This arxiv.org/abs/2505.23655 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_condmatstrel_bot@mastoxiv.page
2025-05-30 07:31:12

Magnonic chaotic comb
Ruitong Sun, Guanqi Ye, Fusheng Ma
arxiv.org/abs/2505.23163 arxiv.org/pdf/2505.23163

@luana@wetdry.world
2025-05-21 01:15:46
Content warning: Polemic take about nuclear energy

Why do so many people completely ignore the fact that human error (and human “error”) and negligence exist when talking about how great and safe nuclear energy is?
Sure, you can make super secure nuclear power plants and super resistant containers for waste storage and take selfies hugging those containers all you want, but all it takes is one idiot to want to cut corners and boom you have nuclear waste hanging around in the nature without proper storage.

@shoppingtonz@mastodon.social
2025-04-26 06:52:30

This test verification worked...
"3rd Keyoxide test"
keyoxide.org/aspe:keyoxide.org
Thus, you can get verified on Mastodon using Keyoxide but how fast you'll be verified or not I can't predict at th…

@arXiv_csCR_bot@mastoxiv.page
2025-06-04 13:34:26

This arxiv.org/abs/2412.15289 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@jby@ecoevo.social
2025-03-14 17:42:06

The Conservation Biology Institute is looking for volunteers with GIS and spatial data experience to help secure and preserve federally funded environmental datasets on their Data Basin platform
mailchi.mp/1757b2a216df/data-b

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 09:55:32

This arxiv.org/abs/2401.14319 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csGR_bot@mastoxiv.page
2025-05-28 07:18:30

Progressively Projected Newton's Method
Jos\'e Antonio Fern\'andez-Fern\'andez, Fabian L\"oschner, Jan Bender
arxiv.org/abs/2505.21013

@arXiv_csCR_bot@mastoxiv.page
2025-06-04 13:38:55

This arxiv.org/abs/2505.04977 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@petaqui@masto.es
2025-04-18 10:49:50

Hey @… , how are you doing with the drive? When you expect it to be available? 💪
mastodon.social/@Tutanota/1123

@alejandrobdn@social.linux.pizza
2025-05-10 16:54:22

Support for Windows 10 ends on October 14, 2025. Microsoft wants you to buy a new computer. But what if you could make your current one fast and secure again?
#linux

@socallinuxexpo@social.linux.pizza
2025-03-05 12:10:00

Thanks to Tailscale for being a Gold Sponsor of SCALE 22x socallinuxexpo.org/scale/22x/s

@arXiv_csNI_bot@mastoxiv.page
2025-05-29 07:20:41

Collaborative Agentic AI Needs Interoperability Across Ecosystems
Rishi Sharma, Martijn de Vos, Pradyumna Chari, Ramesh Raskar, Anne-Marie Kermarrec
arxiv.org/abs/2505.21550

@geant@mstdn.social
2025-05-19 12:17:06

Upcoming GÉANT infoshare - Part 2 🚀
🔐 Quantum KMS Architectures and Services
This session will explore the key aspects of Key Management Systems (KMS) in enabling secure, scalable Quantum Key Distribution. Gain insights on architecture, standardisation, and integration—from both research and industry voices.
🔗 Sign up here:

@arXiv_csCR_bot@mastoxiv.page
2025-05-30 07:16:47

Keyed Chaotic Tensor Transformations for Secure And Attributable Neural Inference
Peter David Fagan
arxiv.org/abs/2505.23655

@eitch@mstdn.gsi.li
2025-03-06 10:30:15

We are proud of our latest Strolch 2.5.0 release, which is now available #Maven central! We have worked hard to offer new features regarding Privileges, Component, Notifications, E-Mail etc.
Here is the blog post: strolch.li/blog/p…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 09:56:25

This arxiv.org/abs/2405.12042 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 10:03:39

This arxiv.org/abs/2502.11844 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCR_…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:18:57

Authentication and authorization in Data Spaces: A relationship-based access control approach for policy specification based on ODRL
Irene Plaza-Ortiz, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Gabriel Huecas, Enrique Barra
arxiv.org/abs/2505.24742

@geant@mstdn.social
2025-04-17 09:31:40

The AfricaConnect3 Impact Report is here!
As we look ahead to the next chapter of the project, this report reflects on an incredible 5 years of progress—and the powerful role that NRENs have played in transforming digital access for Africa’s R&E communities.
Co-funded by the EU, AC3 has enabled over 3,000 institutions and more than 9 million users to benefit from high-speed, affordable, and secure connectivity.
📥 Read the full report: africaconnect3.net/resources (in …

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:17:41

HoneySat: A Network-based Satellite Honeypot Framework
Efr\'en L\'opez-Morales (Texas A&M University-Corpus Christi), Ulysse Planta (CISPA Helmholtz Center for Information Security), Gabriele Marra (CISPA Helmholtz Center for Information Security), Carlos Gonz\'alez (German Aerospace Center), Jacob Hopkins (Texas A&M University-Corpus Christi), Majid Garoosi (CISPA Helmholtz Center for Information Security), El\'ias Obreque (Universidad de Chile), Carlos Rubio-M…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:17:01

Privacy-Preserving Inconsistency Measurement
Carl Corea, Timotheus Kampik, Nico Potyka
arxiv.org/abs/2505.23825 arxiv…

@arXiv_csCR_bot@mastoxiv.page
2025-06-02 07:18:28

Next Generation Authentication for Data Spaces: An Authentication Flow Based On Grant Negotiation And Authorization Protocol For Verifiable Presentations (GNAP4VP)
Rodrigo Men\'endez, Andres Munoz-Arcentales, Joaqu\'in Salvach\'ua, Carlos Aparicio, Irene Plaza, Gabriel Huecas
arxiv.org/abs/2505.24698

@arXiv_csCR_bot@mastoxiv.page
2025-05-30 07:16:41

Joint Data Hiding and Partial Encryption of Compressive Sensed Streams
Cristina-Elena Popa, Cristian Damian, Daniela Coltuc
arxiv.org/abs/2505.23357

@geant@mstdn.social
2025-05-07 13:29:11

📣 Calling all GÉANT Project partners…
Got an idea for digital research, data transfer or secure storage solutions to support open science?
The 2025 GÉANT Above-the-Net Services Incubator is officially open for proposals!
This is your opportunity to:
✅ Develop and test your innovative idea
✅ Deliver impact to the whole community through new, shared, open-source services
✅ Help shape the future of GÉANT's Above-the-Net services portfolio
Learn more: …