Cyber Deception: Evaluation Metrics for Honeypot Research and Development
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
Cyber deception is a technique used to detect and mitigate cybersecurity threats. Honeypots are an essential component of cyber deception, as they are design...
Twitter is a popular source of data (tweets), but accessing the tweets can be a challenge. Previously I scraped data from Medium. In this tutorial, I write h...
MITRE ATT&CK is an essential tool for any organization who are concerned about cybersecurity, especially threat intelligence and threat modeling. In this...
Escape the Houston city and explore the beauty of nature at Huntsville State Park located near Houston. In this post, I add some guidelines to hiking and bik...
Cracking the coding interview is a crucial step in landing our dream tech job. My blog post covers some useful coding interview resources, including source o...
Learn how to create beautiful group-plots in Python with this step-by-step guide. With examples using Matplotlib and Pandas, you can master the art of visual...
Discover the fascinating surrounding of the Fort Travis Historic Site at Port Bolivar Texas through a drone shot. This post provides you on a journey in bird...
Explore the Chisos Basin Mountains of the Big Bend National Park in Texas in Part 02 of our road trip series from Houston. Get tips on hiking trails, wildlif...
In this post, I will take you through the first part of our journey exploring Santa Elena Canyon, one of the park’s most stunning natural wonders. It is loca...
Learn about the difference between symmetric and asymmetric key cryptography in Python with this tutorial. Discover how to use cryptographic algorithms in py...