Eduardo Almeida Palmieri
YOU?
Author Swipe
View article: A Framework for Embedding Generative and Agentic AI in Open Source Intelligence
A Framework for Embedding Generative and Agentic AI in Open Source Intelligence Open
View article: A Framework for Embedding Generative and Agentic AI in Open Source Intelligence (OSINT)
A Framework for Embedding Generative and Agentic AI in Open Source Intelligence (OSINT) Open
View article: "MalVol-25: A Diverse, Labeled and Detailed Malware Volatile Memory Dataset for Detection and Response Testing and Validation"
"MalVol-25: A Diverse, Labeled and Detailed Malware Volatile Memory Dataset for Detection and Response Testing and Validation" Open
"This paper addresses the critical need for high-quality malware datasets that support advanced analysis techniques, particularly reinforcement learning (RL). Existing datasets often lack diversity, comprehensive labelling, and the complex…
View article: Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine Open
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuse…
View article: Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine Open
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and security vulnerabilities. This research paper presents …
View article: Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine Open
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and security vulnerabilities. This research paper presents …
View article: Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine Open
The proliferation of Internet of Things (IoT) devices has introduced new challenges for digital forensic investigators due to their diverse architectures, communication protocols, and security vulnerabilities. This research paper presents …