Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
networksecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Feb 12
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
#
cybersecurity
#
osi
#
networksecurity
#
aiml
6
 reactions
Comments
5
 comments
4 min read
Getting Started with Kubernetes Network Policies: A Beginner's Guide
Akhilesh
Akhilesh
Akhilesh
Follow
Feb 10
Getting Started with Kubernetes Network Policies: A Beginner's Guide
#
kubernetes
#
cloudnative
#
networksecurity
#
devops
Comments
Add Comment
2 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
#
cybersecurity
#
infosec
#
malware
#
networksecurity
Comments
Add Comment
1 min read
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis
Ritwick Mondal
Ritwick Mondal
Ritwick Mondal
Follow
Dec 27 '25
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis
#
cybersecurity
#
networksecurity
#
ai
#
largelanguagemodel
Comments
Add Comment
3 min read
Extracting Flow-Level Network Features from PCAPs with Tranalyzer2
Ritwick Mondal
Ritwick Mondal
Ritwick Mondal
Follow
Dec 26 '25
Extracting Flow-Level Network Features from PCAPs with Tranalyzer2
#
networksecurity
#
trafficanalysis
#
machinelearning
#
encryptedtraffic
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account