Vishwanath AkuthotaSep 26, 20233 min readAdversarial Attacks in Machine Learning: Understanding Impact and Mitigation StrategiesAdversarial Attacks in Machine Learning
Vishwanath AkuthotaSep 5, 20233 min readHow Intrusion Detection Systems (IDS) Can Help Your OrganisationIntrusion detection systems (IDSs) are an essential part of any organisations cybersecurity arsenal. They can help to detect and prevent...
Vishwanath AkuthotaJul 21, 20232 min readSafeguarding Large Language Models: Understanding and Mitigating Potential AttacksLarge language models have revolutionized the field of Natural Language Processing (NLP) and Artificial Intelligence (AI), empowering us...
Vishwanath AkuthotaJun 14, 20221 min readAn HTTP Toolkit For Security ResearchHetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...
DrpinnacleJun 30, 20203 min readInvestigating client view of erasure in versatile texting applicationsContemporary portable informing gives rich content and sight and sound usefulness leaving detailed trails of touchy client data that can...