AhmedDigital Signature vs. Electronic Signature: Concept, Applications, and SecurityTable of Contents:13 min read·1 day ago----
AhmedLLMs in Action: Text Compression and Decompression TechniquesTable of Contents:9 min read·May 11, 2024----
AhmedXZ Backdoor (CVE-2024–3094): Incident, Utils Backdoor Analysis and Defensive MeasuresTable of Contents:8 min read·Apr 19, 2024----
AhmedLarge Language Models (LLMs) in Cybersecurity: A Paradigm Shift in Threat Intelligence..13 min read·Mar 27, 2024--1--1
AhmedAdvancements in NVIDIA AI Research: From Neural 3D Reconstruction to Virtual Behavior GenerationTable of Contents:13 min read·Jan 15, 2024----
AhmedCyber Siege in Banking: The Threat Landscape in Financial InstitutionsTable of Contents:9 min read·Dec 23, 2023----
AhmedC++ vs Python: History, Characteristics and Comparative AnalysisTable of Contents:10 min read·Nov 29, 2023----
AhmedUnmanned Aerial Vehicles (UAVs): Types, Security Risks, and Regulatory FrameworksTable of Contents:8 min read·Oct 31, 2023----
AhmedSecurity Architecture in Modern Web and Mobile Applications: Principles, Challenges, and Best…Table of Contents:12 min read·Oct 9, 2023--1--1
AhmedMessaging Apps Security: Data Correlation, User Behavior and Third-Party Applications RisksTable of Contents:8 min read·Sep 30, 2023----