Search Results for "metasploitable-2"
Sort By:
A smartphone-PC interface for control your computer remotely.
HMM Speech Recognition in Java
A duration high-order hidden Markov model (DHO-HMM) in Java.