The Texas hold 'em NL videogame we deserve, not the one we need, or was it the opposite?
-
Updated
Apr 20, 2026 - Java
The Texas hold 'em NL videogame we deserve, not the one we need, or was it the opposite?
SLATE is a collaborative LaTeX editor that redefines academic work. With real-time syncing and integrated video chat, it transforms how teams write research papers and theses. It’s a complete academic workspace, making remote collaboration seamless and intuitive for students and researchers.
Understanding Zero Trust and ZTA
A learning-focused simulation of adversarial attacks against ML-based network intrusion detection systems within a Zero-Trust architecture, including constrained adversarial modeling, policy enforcement, and security-focused evaluation metrics.
[Apache Kafka | Python | Docker] Evolution of data security: A comparative analysis of Data Warehouses vs. Big Data architectures. Features a fully implemented Zero Trust IoT pipeline with End-to-End Encryption (SSL), Authentication (SASL), and Authorization (ACLs).
Graph Neural Networks for Multi-Entity Access Modeling in Zero Trust Architectures
A zero-trust immutable Linux workstation. Cipherblue transforms Fedora Silverblue into a single-tenant appliance using a cascading node-freeze engine, strict SELinux/Systemd lockdown, and a declarative CI-injected Flatpak vault to eliminate local configuration drift entirely.
Learn and demonstrate Zero Trust Architecture for financial services hands-on — a Kubernetes home lab tutorial mapped tenet-by-tenet to NIST SP 800-207, with runnable manifests and break-it exercises.
A single-file, searchable visual glossary of 73 Zero Trust Architecture concepts for financial institutions — each term paired with a plain-English explanation and an inline SVG diagram, mapped to NIST SP 800-207.
Zero Trust Architecture simulation platform with risk-based access control, attack detection, and real-time visualization.
Zero Trust implementation demonstrating JWT authentication, policy-based authorization and service mesh integration across Go, Python and C# services using Istio, OPA and Keycloak
Formalizing the geometry of secrecy. This repository maps discrete Gaussian distributions onto high-rank cyclotomic lattices to thwart Shor’s algorithm. By utilizing bilinear pairings and modular forms, we provide a rigorous framework for sovereign data at the singularity. Pure math, zero trust, infinite scaling.
Zero Trust eXchange Protocol (ZTXP) — a vendor-neutral, cryptographically verifiable protocol for exchanging trust context across Zero Trust systems.
A hybrid IDS for aircraft is proposed using Random Forests, Isolation Forests, YARA rules, and import hashing within a zero-trust architecture. Evaluated in a virtualized multi-zone testbed, it achieves high accuracy across six aviation datasets with low resource use, enabling practical onboard cybersecurity.
This repository collects Spherity research articles. It provides references and supporting material on digital identity, organizational wallets, the European Business Wallet (EBW), verifiable credentials, Digital Product Passports, data spaces, trust infrastructure, use cases, adoption strategies and business cases.
A research analysis on the convergence of Post-Quantum Cryptography (PQC) and Zero Trust Architecture (ZTA), addressing the 'Harvest Now, Decrypt Later' threat model and NIST 2024 standards.
Secure secrets manager
🔒 Define a lightweight protocol for secure exchange of Trust Assertion Messages (TAMs) in Zero Trust environments.
Add a description, image, and links to the zero-trust-architecture topic page so that developers can more easily learn about it.
To associate your repository with the zero-trust-architecture topic, visit your repo's landing page and select "manage topics."