Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Myth-Tech AI/ML Security Framework Series' Articles
Back to Narnaiezzsshaa Truong's Series
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 29 '25
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
#
cybersecurity
#
ai
#
surveillance
#
threatmodeling
Comments
Add Comment
3 min read
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 29 '25
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems
#
ai
#
machinelearning
#
cybersecurity
#
mythology
Comments
Add Comment
3 min read
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
3 min read
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems
#
ai
#
machinelearning
#
syntheticmythology
#
threatmodeling
Comments
Add Comment
2 min read
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
3 min read
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 31 '25
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
3 min read
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 7 '25
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems
#
ai
#
orchestration
#
mlops
#
multiagent
Comments
1
comment
3 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 7 '25
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 7 '25
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
#
ai
#
machinelearning
#
threatmodeling
#
dualusemythology
Comments
Add Comment
5 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 15 '25
Anansi’s Web as Neural Architecture: From Folklore to Framework
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 12
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
#
security
#
programming
#
ai
#
machinelearning
Comments
Add Comment
6 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 13
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines
#
ai
#
mlops
#
governance
#
shadowai
Comments
Add Comment
1 min read
Why Memory Architecture Matters More Than Your Model
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 16
Why Memory Architecture Matters More Than Your Model
#
agents
#
ai
#
architecture
#
rag
1
reaction
Comments
Add Comment
2 min read
How To Detect Memory Drift In Production Agents
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 17
How To Detect Memory Drift In Production Agents
#
aiarchitecture
#
aigovernance
#
ai
#
llm
1
reaction
Comments
Add Comment
3 min read
Build a Self-Evolving Memory Agent in 150 Lines
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Jan 18
Build a Self-Evolving Memory Agent in 150 Lines
#
agents
#
ai
#
architecture
#
python
Comments
Add Comment
4 min read
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account