Photo by Arget on Unsplash

Intro

The rate of cyber-attacks has increased by multi-fold in the past decade. Some common types of Cyber attacks are SQL Injection, Buffer Overflow Attacks, Denial-of-Service attacks, Session Hijacking.

Finding the right image similarity algorithm

Photo by Héctor J. Rivas on Unsplash

An Overview

There are numerous algorithms present today…

Abhinav Anand

Hello World! I’m a Software Engineer. Loves toying the underlying structures of technologies in the world of zero’s and one’s.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store