toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

273
active users

#amides

0 posts0 participants0 posts today
ChemistryViews<p>Site-Selective Hydrogenation of Amides:<br>Copper(I) N-heterocyclic carbene catalyst with an organocatalytic guanidine moiety for amide reduction<br><a href="https://www.chemistryviews.org/site-selective-hydrogenation-of-amides/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chemistryviews.org/site-select</span><span class="invisible">ive-hydrogenation-of-amides/</span></a></p><p><a href="https://mstdn.social/tags/orgchem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>orgchem</span></a> <a href="https://mstdn.social/tags/catalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>catalysis</span></a> <a href="https://mstdn.social/tags/amides" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amides</span></a> <a href="https://mstdn.social/tags/chemistry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chemistry</span></a> <a href="https://mstdn.social/tags/chemistryviews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chemistryviews</span></a> <a href="https://mstdn.social/tags/chemviews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chemviews</span></a></p>
Marko Jahnke<p>It is not surprising that <a href="https://bonn.social/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a> detection rules can be evaded in many cases, this is the same as for signature-based detection of <a href="https://bonn.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> in general.</p><p>This approach uses a combination of misuse and <a href="https://bonn.social/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AnomalyDetection</span></a> to find potential <a href="https://bonn.social/tags/evation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evation</span></a> attempts. The PoC implementation is called <a href="https://bonn.social/tags/AMIDES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMIDES</span></a>, and the code is available on GitHub.</p><p><a href="https://www.usenix.org/conference/usenixsecurity24/presentation/uetz" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">usenix.org/conference/usenixse</span><span class="invisible">curity24/presentation/uetz</span></a></p><p><a href="https://bonn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://bonn.social/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a></p>