Picture for Ricardo Morla

Ricardo Morla

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Add code
Sep 02, 2022
Figure 1 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Figure 2 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Figure 3 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Figure 4 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Viaarxiv icon

Ten AI Stepping Stones for Cybersecurity

Add code
Dec 14, 2019
Figure 1 for Ten AI Stepping Stones for Cybersecurity
Viaarxiv icon

Anomaly Detection and Modeling in 802.11 Wireless Networks

Add code
Jul 04, 2017
Figure 1 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Figure 2 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Figure 3 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Figure 4 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Viaarxiv icon

Long-Range Trajectories from Global and Local Motion Representations

Add code
Sep 29, 2015
Figure 1 for Long-Range Trajectories from Global and Local Motion Representations
Figure 2 for Long-Range Trajectories from Global and Local Motion Representations
Figure 3 for Long-Range Trajectories from Global and Local Motion Representations
Figure 4 for Long-Range Trajectories from Global and Local Motion Representations
Viaarxiv icon

Event and Anomaly Detection Using Tucker3 Decomposition

Add code
Jun 12, 2014
Figure 1 for Event and Anomaly Detection Using Tucker3 Decomposition
Figure 2 for Event and Anomaly Detection Using Tucker3 Decomposition
Figure 3 for Event and Anomaly Detection Using Tucker3 Decomposition
Figure 4 for Event and Anomaly Detection Using Tucker3 Decomposition
Viaarxiv icon