PinnedAngelina TsuboiinMartian Defense CybersecurityA Comprehensive Guide to Digital Forensics with DJI DronesDrone digital forensics is used to investigate UAV crime scenarios. This article researches the best forensics techniques for DJI drones.·36 min read·Jul 20, 2023--1--1
PinnedAngelina TsuboiinMartian Defense CybersecurityDrone Reverse Engineering using Packet Dissection with WiresharkA cybersecurity research article diving into reverse engineering DJI drone communication protocol systems using Wireshark27 min read·May 18, 2023--3--3
Angelina TsuboiDetecting Hacker Aircraft Using Artificial IntelligenceAircraft Spoofing Detection Using Artificial Intelligence and a Custom Device called Fly Catcher19 min read·Nov 25, 2023----
Angelina TsuboiinSystem WeaknessBio-Cybersecurity: Using Genetic Algorithms to Detect Malicious URLsIn this biomimicry-based cybersecurity research article, learn how genetic algorithms can be employed to detect for malicious URLs31 min read·Aug 20, 2023----
Angelina TsuboiRemote Sensing and Signals Analysis with Meteorological SatellitesA meteorology research article explaining how weather satellites function and how to retrieve data from them via OSINT and decoding·33 min read·Jul 27, 2023----
Angelina TsuboiinSystem WeaknessSatellite OSINT: Space-Based Intelligence in CybersecurityEmploy a cybersecurity technique known as OSINT to perform reconnaissance on satellites to retrieve useful telemetry data15 min read·May 10, 2023--4--4
Angelina TsuboiinSystem WeaknessQuantum Circuits & Key Distribution for CryptographyLearn about quantum computing in cybersecurity by exploring quantum circuits, cryptography protocols, and key distribution.14 min read·Apr 18, 2023--1--1
Angelina TsuboiMultiplexing Electronics and the CD4051 Integrated CircuitMultiplexing is a technique used in electronics design that transmits multiple signals over a single communication channel.8 min read·Apr 10, 2023----
Angelina TsuboiinBetter ProgrammingMake Dynamic Web Extensions: Scripting, Tabs, and Storage APIsAn overview of Chrome APIs and features used to develop dynamic systems using code snippets8 min read·Mar 27, 2023----
Angelina TsuboiinSystem Weaknessnetspionage: Network Forensics Utilitynetspionage is a CLI tool developed specifically for performing reconnaissance, enumerating, and detecting attacks on a network.10 min read·Feb 13, 2023--1--1