Some interesting results from a BPPA survey here. What do readers make of this? Signed comments strongly preferred, though grad students may post anonymously as long as they used a valid e-mail address (which will not appear).
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply