Alert button
Picture for Ricardo Morla

Ricardo Morla

Alert button

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Add code
Bookmark button
Alert button
Sep 02, 2022
Gonçalo Xavier, Carlos Novo, Ricardo Morla

Figure 1 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Figure 2 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Figure 3 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Figure 4 for Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
Viaarxiv icon

Ten AI Stepping Stones for Cybersecurity

Add code
Bookmark button
Alert button
Dec 14, 2019
Ricardo Morla

Figure 1 for Ten AI Stepping Stones for Cybersecurity
Viaarxiv icon

Anomaly Detection and Modeling in 802.11 Wireless Networks

Add code
Bookmark button
Alert button
Jul 04, 2017
Anisa Allahdadi, Ricardo Morla

Figure 1 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Figure 2 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Figure 3 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Figure 4 for Anomaly Detection and Modeling in 802.11 Wireless Networks
Viaarxiv icon

Long-Range Trajectories from Global and Local Motion Representations

Add code
Bookmark button
Alert button
Sep 29, 2015
Eduardo M. Pereira, Jaime S. Cardoso, Ricardo Morla

Figure 1 for Long-Range Trajectories from Global and Local Motion Representations
Figure 2 for Long-Range Trajectories from Global and Local Motion Representations
Figure 3 for Long-Range Trajectories from Global and Local Motion Representations
Figure 4 for Long-Range Trajectories from Global and Local Motion Representations
Viaarxiv icon

Event and Anomaly Detection Using Tucker3 Decomposition

Add code
Bookmark button
Alert button
Jun 12, 2014
Hadi Fanaee-T, Márcia D. B. Oliveira, João Gama, Simon Malinowski, Ricardo Morla

Figure 1 for Event and Anomaly Detection Using Tucker3 Decomposition
Figure 2 for Event and Anomaly Detection Using Tucker3 Decomposition
Figure 3 for Event and Anomaly Detection Using Tucker3 Decomposition
Figure 4 for Event and Anomaly Detection Using Tucker3 Decomposition
Viaarxiv icon