• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 189
  • 32
  • 30
  • 22
  • 16
  • 10
  • 9
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 387
  • 387
  • 97
  • 92
  • 59
  • 55
  • 50
  • 45
  • 36
  • 34
  • 33
  • 33
  • 31
  • 29
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Reverse Engineering of a Malware : Eyeing the Future of Computer Security

Burji, Supreeth Jagadish 05 October 2009 (has links)
No description available.
342

Transmedia Storytelling & Web 4.0 — an upcoming love story : Investigating transmedia storytelling across Web 2.0 & 3.0 to assess its relationship with Web 4.0

Solsjö, Cornelia, Aronsson, Sandra January 2022 (has links)
The world wide web has gone through several distinct eras since its launch in 1989, going through the eras Web 1.0, Web 2.0, and Web 3.0. There is an upcoming era, Web 4.0, where the web will become seamlessly integrated with people's everyday life. However, creating consumer engagement across platforms has already been recognized as challenging in Web 3.0 (Dolan et al., 2016). A type of storytelling, known for creating engagement is transmedia storytelling (TS). TS is a technique of telling one single story across multiple platforms, and when enjoyed together becomes a full experience. There is limited research conducted on the relationship between TS and the web, which became the problem of this study. The purpose of this study is to explorethe research gap and it was fulfilled by asking two research questions. The first oneestablished an understanding about the relationship between TS and Web 2.0 and 3.0, tounderstand how TS evolves and adapts to the web. Based on the built foundation, the second question aimed to explore the possibilities of TS and Web 4.0, and how they could benefit from each other and grow together. To answer our research questions this paper utilised the method of a multiple-case study that examines two cases, one in Web 2.0, and one in Web 3.0. The data was manually collected, traced and broken down into instances using reverse engineering. To analyse the data, it was rebuilt with visual mapping to understand the connections, and lastly compared to the web characteristics and TS principles. Concluding the findings and analysis, it can be established that TS evolves alongside the web, utilising and adapting to the new characteristics. In Web 2.0, TS relied heavily on offline sources such as DVD’s and TV, while in Web 3.0, it existed solely online. The participatory activity also grew from Web 2.0 to 3.0, where the users were an active part of the campaign evolving in Web 3.0. TS manages to create engagement across platforms, and benefits from new technical innovations. After the individual case reports, and cross-case analysis, it could be concluded that TS has good chances of continuing to adapt in the rise of Web 4.0. This study explored the research gap further, offering valuable insight onthe topic and opening for various further research possibilities, where TS and web cancontinue being investigated.
343

Determining whether the Hövding bicycle airbag is secure against cyber attacks / Att avgöra om en Hövding cykel-airbag är skyddad mot cyberangrepp

Mellin, Henrik January 2022 (has links)
This thesis is about cyber-security and penetration testing. More specifically it concerns penetration testing of a Hövding bicycle airbag which is a smart alternative to a traditional bicycle helmet. The thesis focuses on exploiting Bluetooth Low Energy, firmware analysis and reverse engineering. The research question is as follows: Is the Hövding bicycle airbag secure against cyber attacks? No previous work has been done with regards to penetration testing the Hövding, despite its popularity. The Hövding’s latest model allows users to connect to their Hövding using a smartphone, with Bluetooth Low Energy as a communication protocol. There is limited research that has been done on exploiting this protocol, which is relatively complex and secure. To answer the research question a number of threats and attacks is identified with the help of the STRIDE model and whose risk is assessed with the DREAD model. These attacks are later executed in a series of penetration tests on the Hövding. The result shows that the Hövding has been securely developed and no vulnerabilities are found. Although no vulnerabilities are found the thesis discusses various approaches that can be useful for further work relating penetration testing similar devices. Regarding further work on the Hövding, there might be some vulnerabilities left to be discovered, perhaps related to hardware hacking or firmware tampering. / I denna avhandling analyseras cybersäkerhet och penetrationstestning. Den behandlar penetrationstestning av Hövdings cykelairbag som är ett uppkopplat alternativ till traditionell cykelhjälm. Fokus är exploatering av Bluetooth Low Energy, analys av fast programvara och baklängeskonstruktion. Frågeställningen lyder: Är Hövdings cykelairbag skyddad mot cyberangrepp? Det finns inga tidigare vetenskapliga arbeten rörande penetrationstestning av Hövdingen, trots dess popularitet. Hövdings senaste modell tillåter användaren att ansluta cykelairbagen till mobil med hjälp av Bluetooth Low Energy-protokollet. Forskning om exploatering av detta protokoll, som är relativt komplext och säkert, är begränsat. För att besvara frågeställningen identifieras hot och attacker med hjälp av STRIDE-modellen vars risk sedan fastställs med DREAD-modellen. Dessa attacker genomförs i en serie penetrationstest på Hövdingen. Resultatet visar att Hövdingen har utvecklats på ett säkert sätt och inga sårbarheter påträffas. Trots att inga sårbarheter påträffas diskuteras olika ansatser som kan vara tillämpliga för framtida penetrationstestning av liknande apparater. Gällande framtida studier av Hövdingen kan det möjligtvis finnas sårbarheter kvar att upptäcka, till exempel inom hårdvaruhackning eller manipulering av fast programvara.
344

Penetration testing of Android applications

Nilsson, Robin January 2020 (has links)
The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. That is why penetration testing of Android applications is important and it is also why Google has a bug bounty program where people can submit vulnerability reports on their most downloaded applications. The aim of the project was to assess the security of Android applications from the Google Play Security Reward Program by performing penetration tests on the applications. A threat model of Android applications was made where potential threats were identified. A choice was made to focus on the Spotify Application for Android where threats were given ratings based on risks associated with them in the context of the Spotify Application. Penetration tests were made where testing depth was determined by the ratings associated with the attacks.The results of the tests showed that the Spotify Application is secure, and no test showed any real possibility of exploiting the application. The perhaps biggest potential exploit found is a Denial of Service attack that can be made through a malicious application interacting with the Spotify application. The result doesn’t guarantee that the application isn’t penetrable and further testing is needed to give the result more reliability. The methods used in the project can however act as a template for further research into both Spotify and other Android applications. / Marknaden för Android applikationer är enorm och 2019 laddade Google Play användare ner 84.3 miljarder mobil-applikationer. Med en så stor användarbas kan potentiella säkerhetsproblem få stora negativa konsekvenser. Det är därför penetrationstest är viktiga och varför Google har ett bug bounty program där folk kan skicka in sårbarhetsrapporter för deras mest nedladdade applikationer. Målet med projektet är att bedöma säkerheten hos Android applikationer från Google Play Security Reward Program genom utförande av penetrationstester på applikationerna. En hotmodell över Android applikationer skapades, där potentiella hot identifierades. Ett val att fokusera på Spotify för Android gjordes, där hot gavs rankingar baserat på riskerna associerade med dem i kontexten av Spotify applikationen. Penetrationstest gjordes med testdjup avgjort av rankingarna associerade med attackerna.Resultatet av testen visade att Spotify applikationen var säker, och inga test visade på några riktiga utnyttjningsmöjligheter av applikationen. Den kanske största utnyttjningsmöjligheten som hittades var en Denial of Service-attack som kunde göras genom en illvillig applikation som interagerar med Spotify applikationen. Resultaten garanterar inte att applikationen inte är penetrerbar och fortsatt testande behövs för att ge resultatet mer trovärdighet. Metoderna som användes i projektet kan i alla fall agera som en mall för fortsatt undersökning av både Spotify såväl som andra Android applikationer.
345

Algorithms for modeling and simulation of biological systems; applications to gene regulatory networks

Vera-Licona, Martha Paola 27 June 2007 (has links)
Systems biology is an emergent field focused on developing a system-level understanding of biological systems. In the last decade advances in genomics, transcriptomics and proteomics have gathered a remarkable amount data enabling the possibility of a system-level analysis to be grounded at a molecular level. The reverse-engineering of biochemical networks from experimental data has become a central focus in systems biology. A variety of methods have been proposed for the study and identification of the system's structure and/or dynamics. The objective of this dissertation is to introduce and propose solutions to some of the challenges inherent in reverse-engineering of biological systems. First, previously developed reverse engineering algorithms are studied and compared using data from a simulated network. This study draws attention to the necessity for a uniform benchmark that enables an ob jective comparison and performance evaluation of reverse engineering methods. Since several reverse-engineering algorithms require discrete data as input (e.g. dynamic Bayesian network methods, Boolean networks), discretization methods are being used for this purpose. Through a comparison of the performance of two network inference algorithms that use discrete data (from several different discretization methods) in this work, it has been shown that data discretization is an important step in applying network inference methods to experimental data. Next, a reverse-engineering algorithm is proposed within the framework of polynomial dynamical systems over finite fields. This algorithm is built for the identification of the underlying network structure and dynamics; it uses as input gene expression data and, when available, a priori knowledge of the system. An evolutionary algorithm is used as the heuristic search method for an exploration of the solution space. Computational algebra tools delimit the search space, enabling also a description of model complexity. The performance and robustness of the algorithm are explored via an artificial network of the segment polarity genes in the D. melanogaster. Once a mathematical model has been built, it can be used to run simulations of the biological system under study. Comparison of simulated dynamics with experimental measurements can help refine the model or provide insight into qualitative properties of the systems dynamical behavior. Within this work, we propose an efficient algorithm to describe the phase space, in particular to compute the number and length of all limit cycles of linear systems over a general finite field. This research has been partially supported by NIH Grant Nr. RO1GM068947-01. / Ph. D.
346

Truss Parametrization of Topology Optimization Results with Curve Skeletons and Meta Balls

Denk, M., Rother, K., Paetzold, Kristin 18 June 2024 (has links)
Truss-like shapes can occur in topology optimization described by an assembly of finite elements or its boundary represented as a polygon mesh. Such shape description does not cover a common engineering parametrization like the lines of a frame structure and its corresponding cross-section. This article addresses the truss-parametrization of such optimization using curve skeletons and Meta Balls. While the curve skeleton is common in the truss-parametrization, including Meta Balls can lead to an overall implicit and smooth shape description.
347

Entwerfen Entwickeln Erleben 2016 - Beiträge zur virtuellen Produktentwicklung und Konstruktionstechnik

10 December 2016 (has links) (PDF)
Die Konferenz Entwerfen – Entwickeln – Erleben bietet ein besonderes Podium zum Austausch von Wissenschaftlern und Praxisvertretern aus den zentralen Bereichen der Produktentwicklung. Der vorliegende Band enthält Beiträge der EEE2016 unter anderem zu Industrie 4.0, Cyber-Physical Systems und Virtual Reality in vielfältigen Anwendungsbereichen des Maschinenbaus, zu Innovationsmanagement, Konstruktionsmethodik und Product Lifecycle Management sowie zu Reverse Engineering und generativen Verfahren. Die Technische Universität Dresden und technischesdesign.org ermöglichten in Kooperation mit der Gruppe Virtuelle Produktentwicklung der Wissenschaftlichen Gesellschaft für Produktentwicklung (WiGeP) und dem Rat für Formgebung die fachübergreifende Diskussion des Schwerpunkt- Themas inmitten der interdisziplinären Dresdner Wissenschaftslandschaft. In diesem Band sind die Beiträge zur Konstruktionstechnik und zur Virtuellen Produktentwicklung enthalten, ein weiterer Band (ISBN 978-3-95908-061-3, herausgegeben von Jens Krzywinski et al.) fasst die Beiträge zum Industrial Design zusammen.
348

Quality Assurance of Test Specifications for Reactive Systems / Qualitätssicherung von Testspezifikationen für Reaktive Systeme

Zeiß, Benjamin 02 June 2010 (has links)
No description available.
349

Entwerfen Entwickeln Erleben 2014 – Beiträge zur virtuellen Produktentwicklung und Konstruktionstechnik

20 October 2014 (has links) (PDF)
Die Konferenz Entwerfen – Entwickeln – Erleben bietet ein besonderes Podium zum Austausch von Wissenschaftlern und Praxisvertretern aus den zentralen Bereichen der Produktentwicklung. Der vorliegende Band enthält Beiträge der EEE2014 unter anderem zu Industrie 4.0, Cyber-Phy­sical Systems und Virtual Reality in vielfältigen Anwendungsbereichen des Maschinenbaus, zu Innovationsmanagement, Konstruktionsmetho­dik und Product Lifecycle Management sowie zu Reverse Engineering und generativen Verfahren. Die Technischen Universität Dresden und technischesdesign.org ermög­lichten in Kooperation mit der Gruppe Virtuelle Produktentwicklung der Wissenschaftlichen Gesellschaft für Produktentwicklung (WiGeP), dem Mathematisch-Physikalischen Salon der Staatlichen Kunstsammlungen Dresden und der Hochschule für Bildende Künste Dresden die fachüber­greifende Diskussion des Schwerpunkt-Themas inmitten der Dresdner Altstadt. In diesem Band sind die Beiträge zur Konstruktionstechnik und zur Virtuellen Produktentwicklung enthalten, ein weiterer Band (http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-144950, herausgegeben von Mario Linke et al.) fasst die Bei­träge zum Technischen Design zusammen.
350

Entwerfen Entwickeln Erleben - Methoden und Werkzeuge in der Produktentwicklung

25 August 2017 (has links) (PDF)
Die Konferenz »Entwerfen – Entwickeln – Erleben« führte am 14. und 15. Juni 2012 das 10. Gemeinsame Kolloquium Konstruktionstechnik und das 5. Symposium Technisches Design zusammen. In Kooperation mit dem Kunstgewerbemuseum der Staatlichen Kunstsammlungen Dresden war es möglich, die fachübergreifende Diskussion industrieller Herausforderungen sowie aktueller Trends und Innovationen der Forschung in einem einzigartigen kulturellem Umfeld – dem Dresdner Residenzschloss – zu führen. Im Mittelpunkt der zweitägigen Konferenz stand der Erfahrungsaustausch zwischen Experten aus Industrie und Wissenschaft über neue Werkzeuge und Methoden, mit denen den aktuellen Herausforderungen von Globalisierung, Nachhaltigkeit und ökonomischen Rahmenbedingungen bei der Entwicklung immer komplexerer Produkte entsprochen werden kann. In diesem Band sind die Textfassungen der Fachvorträge zu den thematischen Schwerpunkten Virtuelle Produktentwicklung (CAD-Einsatzszenarien, Virtual Reality und Product Lifecycle Management), Konstruktion (Konstruktionstechnik und -methodik, Reverse Engineering und Maschinenelemente) enthalten. Ein separater Band, herausgegeben von Linke et al. (ISBN 978-3-942710-75-6) enthält die Beiträge zum Technischen Design (Industriedesign, Transportation Design und Produkterleben).

Page generated in 0.0617 seconds