PinnedAhmedDigital Forensics 101: The 5 Critical Mistakes that can Derail the Career PathTable of Contents:May 18, 2023May 18, 2023
PinnedAhmedMachine Learning in Malware Detection: Concept, techniques and use cases1- IntroductionApr 26, 2023Apr 26, 2023
AhmedDigital Signature vs. Electronic Signature: Concept, Applications, and SecurityTable of Contents:May 17May 17
AhmedXZ Backdoor (CVE-2024–3094): Incident, Utils Backdoor Analysis and Defensive MeasuresTable of Contents:Apr 19Apr 19
AhmedLarge Language Models (LLMs) in Cybersecurity: A Paradigm Shift in Threat Intelligence..Mar 271Mar 271
AhmedAdvancements in NVIDIA AI Research: From Neural 3D Reconstruction to Virtual Behavior GenerationTable of Contents:Jan 15Jan 15
AhmedCyber Siege in Banking: The Threat Landscape in Financial InstitutionsTable of Contents:Dec 23, 2023Dec 23, 2023
AhmedC++ vs Python: History, Characteristics and Comparative AnalysisTable of Contents:Nov 29, 2023Nov 29, 2023