Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
7 sources · matching filters · sorted by citation density
Sort
BApplied AI in Security2 sources
01
MLflowDatabricks

Open-source platform for managing the end-to-end ML lifecycle. Covers experiment tracking, model registry, and deployment.

Test your knowledge · B7
02

Platform for ML experiment tracking, model versioning, and collaborative model development with security considerations.

Test your knowledge · B7
CCybersecurity of AI Systems5 sources
01

Application container security guide covering image, registry, orchestrator, container, and host OS security.

FrameworkIntermediateC6 · AI Infrastructure SecurityNEW · 1mo ago
Test your knowledge · C6
02
MLflow / Kubeflow / Ray Security DocumentationVarious (Databricks, Google, Anyscale)

Security docs for major ML platforms. Covers authentication, authorization, experiment tracking security, model registry access controls. Practical infrastructure security questions.

ToolIntermediateC6 · AI Infrastructure SecurityNEW · 22d ago
Test your knowledge · C6
03

Official Kubernetes documentation on securing clusters, pods, and workloads. Essential for ML infrastructure security.

GuideIntermediateC6 · AI Infrastructure SecurityNEW · 1mo ago
Test your knowledge · C6
04

GPU cluster security, multi-tenant GPU isolation, model serving infrastructure hardening. Vendor-specific but covers unique infrastructure challenges (GPU memory isolation, CUDA vulnerabilities) not covered elsewhere.

GuideIntermediateC6 · AI Infrastructure SecurityNEW · 22d ago
Test your knowledge · C6
05

Security audit firm with deep AI/ML expertise. Published research on pickle deserialization attacks, model file format security, and ML pipeline vulnerabilities. Technical depth from a security-first perspective.

Test your knowledge · C6

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.