DEV Community

Myth-Tech AI/ML Security Framework Series' Articles

Back to Narnaiezzsshaa Truong's Series
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
Cover image for The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

Comments
3 min read
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems
Cover image for The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

Comments
3 min read
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift
Cover image for The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

Comments
2 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
Cover image for The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems
Cover image for Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Comments
2 min read
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration
Cover image for The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

Comments
2 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic
Cover image for The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

Comments
3 min read
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

Comments 1
3 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
Cover image for The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
Cover image for Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Comments
5 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework
Cover image for Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
Cover image for Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines
Cover image for How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

Comments
1 min read
Why Memory Architecture Matters More Than Your Model
Cover image for Why Memory Architecture Matters More Than Your Model

Why Memory Architecture Matters More Than Your Model

1
Comments
2 min read
How To Detect Memory Drift In Production Agents
Cover image for How To Detect Memory Drift In Production Agents

How To Detect Memory Drift In Production Agents

1
Comments
3 min read
Build a Self-Evolving Memory Agent in 150 Lines
Cover image for Build a Self-Evolving Memory Agent in 150 Lines

Build a Self-Evolving Memory Agent in 150 Lines

Comments
4 min read