CyberLymphaLegacy pairing in Bluetooth Low Energy and its vulnerabilitiesThis article focuses on an old, though still relevant, Bluetooth Low Energy 4.0–4.1 vulnerability.Sep 28, 2023Sep 28, 2023
CyberLymphaAnomalies Detection in Time SeriesThe number of devices, systems, services and platforms belonging to industrial, informational and cyber-physical spheres arоund us…Dec 14, 2021Dec 14, 2021
CyberLymphaIdentifying Hosts Class and Detecting Anomalies in Hosts Activity by Passive Network Traffic…1. RelevanceNov 8, 2021Nov 8, 2021
CyberLymphaIs Restricted Software Environment a spherical cow?A dive into secure software and system designSep 29, 2021Sep 29, 2021