no code implementations • 2 Sep 2022 • Gonçalo Xavier, Carlos Novo, Ricardo Morla
In this paper we start with these identifiable patterns in Metasploit's C2 traffic and show that a machine learning-based detector is able to detect the presence of such traffic with high accuracy, even when encrypted.
no code implementations • 14 Dec 2019 • Ricardo Morla
With the turmoil in cybersecurity and the mind-blowing advances in AI, it is only natural that cybersecurity practitioners consider further employing learning techniques to help secure their organizations and improve the efficiency of their security operation centers.
1 code implementation • 10 Jul 2017 • Anisa Allahdadi, Ricardo Morla, Jaime S. Cardoso
Despite the growing popularity of 802. 11 wireless networks, users often suffer from connectivity problems and performance issues due to unstable radio conditions and dynamic user behavior among other reasons.
Networking and Internet Architecture
no code implementations • 4 Jul 2017 • Anisa Allahdadi, Ricardo Morla
IEEE 802. 11 Wireless Networks are getting more and more popular at university campuses, enterprises, shopping centers, airports and in so many other public places, providing Internet access to a large crowd openly and quickly.
no code implementations • 29 Sep 2015 • Eduardo M. Pereira, Jaime S. Cardoso, Ricardo Morla
Motion is a fundamental cue for scene analysis and human activity understan- ding in videos.
no code implementations • 12 Jun 2014 • Hadi Fanaee-T, Márcia D. B. Oliveira, João Gama, Simon Malinowski, Ricardo Morla
Among unsupervised approaches, Principal Component Analysis (PCA) is a well-known solution which has been widely used in the anomaly detection literature and can be applied to matrix data (e. g. Users-Features).