-
Hi all,
I am trying to do visual odometry of an aircraft with a downward-looking camera with ~42° FOV. Just for a quick summary, I am optimizing an SE3 pose using the 'sba' vertices and edges. All …
-
It's interesting having different types of terrain have different levels of resistance to movement, meaning that the `move` command takes a different ammount of ticks to execute depending on what type…
-
Hi, sorry to bother.
I am currently engaged in a research project in **_roundabout_** scenarios. My problems are as follows:
1. I am using the **_ContinuousAction_** action type, where the outpu…
-
From `Readme`:
> CIS benchmarks — best description of hardening strategies (for some OSes), but no mapping to MITRE ATT&CK. Once they will implement this mapping, we will integrate their analytics …
-
### User Story
NCSC said:
"**VPC Security**
Each VPC is provisioned with its own public, private, and data subnets. There are two further subnets spanning all VPCs (Transit Gateway and Protected) – t…
-
|Wazuh version|Component|Install type|Install method|Platform|
|---|---|---|---|---|
|
-
We need to be able to manually submit attacks/events to the event endpoint. To do this, we need to be able to enumerate the current teams, event types, and event information so that it can be selected…
-
I am building a [tool](https://github.com/Ng00m4lDhuhr/LogThoth) that create a timeline branches based on context. I really really want to test it on these samples yet my tool can only work with Secur…
-
hi, I'd like to use your program to demonstrate the transition between platonic solids. the illustration would go something like this:
1. start with a tetrahedron, such that it's not pointing upward …
-
As part of Private Network Access integration we need to expose a field on the connection it can use to segment the internet. In a non-proxy setup this would the IP address that ends up being used (se…