DEV Community

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

404 bio not found

Location Texas, United States Joined Joined on 
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

Comments
2 min read
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Comments
2 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

Comments
2 min read
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

Comments
3 min read
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

Comments
3 min read
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

Comments
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

3
Comments
8 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

4
Comments
9 min read
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

10
Comments 1
11 min read
What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

4
Comments
16 min read
Teaching OWASP Top 10 Through Visual Frameworks

Teaching OWASP Top 10 Through Visual Frameworks

Comments
16 min read
loading...