PinnedAngelina TsuboiinMartian Defense CybersecurityA Comprehensive Guide to Digital Forensics with DJI DronesDrone digital forensics is used to investigate UAV crime scenarios. This article researches the best forensics techniques for DJI drones.Jul 20, 20231Jul 20, 20231
PinnedAngelina TsuboiinMartian Defense CybersecurityDrone Reverse Engineering using Packet Dissection with WiresharkA cybersecurity research article diving into reverse engineering DJI drone communication protocol systems using WiresharkMay 18, 20233May 18, 20233
Angelina TsuboiDetecting Hacker Aircraft Using Artificial IntelligenceAircraft Spoofing Detection Using Artificial Intelligence and a Custom Device called Fly CatcherNov 25, 2023Nov 25, 2023
Angelina TsuboiinSystem WeaknessBio-Cybersecurity: Using Genetic Algorithms to Detect Malicious URLsIn this biomimicry-based cybersecurity research article, learn how genetic algorithms can be employed to detect for malicious URLsAug 20, 2023Aug 20, 2023
Angelina TsuboiRemote Sensing and Signals Analysis with Meteorological SatellitesA meteorology research article explaining how weather satellites function and how to retrieve data from them via OSINT and decodingJul 27, 2023Jul 27, 2023
Angelina TsuboiinSystem WeaknessSatellite OSINT: Space-Based Intelligence in CybersecurityEmploy a cybersecurity technique known as OSINT to perform reconnaissance on satellites to retrieve useful telemetry dataMay 10, 20234May 10, 20234
Angelina TsuboiinSystem WeaknessQuantum Circuits & Key Distribution for CryptographyLearn about quantum computing in cybersecurity by exploring quantum circuits, cryptography protocols, and key distribution.Apr 18, 20231Apr 18, 20231
Angelina TsuboiMultiplexing Electronics and the CD4051 Integrated CircuitMultiplexing is a technique used in electronics design that transmits multiple signals over a single communication channel.Apr 10, 2023Apr 10, 2023
Angelina TsuboiinBetter ProgrammingMake Dynamic Web Extensions: Scripting, Tabs, and Storage APIsAn overview of Chrome APIs and features used to develop dynamic systems using code snippetsMar 27, 2023Mar 27, 2023
Angelina TsuboiinSystem Weaknessnetspionage: Network Forensics Utilitynetspionage is a CLI tool developed specifically for performing reconnaissance, enumerating, and detecting attacks on a network.Feb 13, 20231Feb 13, 20231