Searched for: contributor%3A%22Smaragdakis%2C+G.+%28graduation+committee%29%22
(1 - 20 of 25)

Pages

document
Amalan, Akash (author)
<br/>The rapid advancement of artificial intelligence technologies has significantly increased the complexity of polymorphic and metamorphic malware, presenting new challenges to cybersecurity defenses. Our study introduces a novel bioinformatics-inspired approach, leveraging deep learning and phylogenetic analysis to understand the evolutionary...
master thesis 2024
document
Castagnaro, Alberto (author)
Web Vulnerability Assessment and Penetration Testing (Web VAPT) is an important cybersecurity practice that thoroughly examines web applications to uncover possible vulnerabilities. These vulnerabilities represent potential security gaps that could severely compromise the web applications' integrity and functionality if exploited by malicious...
master thesis 2024
document
Angelova, Yana (author)
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday". <br/>Despite the increased importance, not all organisations have the same resources and knowledge when it comes to securing their networks against cyber adversaries. <br/><br...
master thesis 2023
document
Zhang, Manning (author)
Searchable symmetric encryption (SSE) is an encryption scheme that allows a single user to perform searches over an encrypted dataset. The advent of dynamic SSE has further enhanced this scheme by enabling updates to the encrypted dataset, such as insertions and deletions. In dynamic SSE, attackers have employed file injection attacks, initially...
master thesis 2023
document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
Rijsdijk, Joris (author)
Virtual Reality allows for the ultimate immersion in environments not naturally encountered. Still, hyperbolic environments are extremely difficult to get used to. This paper explores whether immersion in virtual hyperbolic environments can be enhanced by introducing a procedurally generated world. We propose a Wave Function Collapse (WFC)...
bachelor thesis 2023
document
Snellenberg, Ravi (author)
It is possible to use a different representation of space in a Virtual Reality (VR) game, instead of using the euclidean representation we are used to. The reason why that is interesting is that it opens up the possibility of traversing infinitely far in the virtual space while being confined to a relatively limited space in the real world. But...
bachelor thesis 2023
document
de Vries, Ate-Jan (author)
Non-Euclidean spaces are spaces that do not satisfy all of Euclid’s postulates. An example of such a space is hyperbolic space. In this paper, a method is discussed to draw a tessellation of hyperbolic space in a manner that fits with the virtual reality game "Holonomy", a game which takes place in hyperbolic space. The main result shows that...
bachelor thesis 2023
document
Jochems, Scott (author)
Navigation is a core aspect of exploring virtual environments. To assist players, a mini-map is a commonly used navigational tool. Navigation in an unknown space can be difficult. This difficulty is only increased when a player finds themselves in a non-Euclidean space. This paper explores the effect the mini-map's positioning has on the player...
bachelor thesis 2023
document
van Schaick, Bart (author)
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications demand confidentiality, necessitating the development of permissioned...
master thesis 2023
document
Miedema, Fieke (author)
How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, ensure a smooth operation of business? Avalanche had the attention of security researchers and law enforcement, yet it managed to persevere for a long period of time.<br/>In this work, we answer this question by analyzing Avalanche’s security...
master thesis 2022
document
Thomas, Jeroen (author)
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after which the server returns the documents that match the keyword (or...
master thesis 2022
document
Huisman, Rick (author)
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...
master thesis 2022
document
Thiessen, Sven (author)
The uprise of the Internet of Things (IoT) has been a hot topic for several years. While many see these devices and think they bring ease to their lives, it is far from reality. Researchers found many privacy and security problems within these devices in the last years. The popularity of these devices causes many users to bring a device into...
master thesis 2022
document
Maquelin, Suzanne (author)
Interpreted applications are often vulnerable to remote code execution attacks. To protect interpreted applications, we should reduce the tools available to the attackers. In this thesis, we investigate the possibilities for the automation of policy generation for interpreted applications in terms of system call arguments. These policies are...
master thesis 2022
document
Okoń, Michał (author)
In recent months, researchers developed several new search procedures to augment the process of program synthesis. While many of them performed better than their predecessors, the proposed solutions are still far from ideal. One possible way of overcoming the shortcomings of single search methods is employing genetic algorithms, which have been...
bachelor thesis 2022
document
EFTHYMIOU, NIKOLAOS (author)
Program Synthesis is a challenging problem in Artificial Intelligence. An important element of a program synthesizer is the objective function that guides the combinatorial search for a program that satisfies a given user intent. Given multiple I/O example transformations that correspond to the intended behavior of the program, this function...
bachelor thesis 2022
document
KIM, DONGHWI (author)
Extrapolation of the learning curve provides an estimation of how much data is needed to achieve the desired performance. It can be beneficial when gathering data is complex, or computation resource is limited. One of the essential processes of learning curve extrapolation is curve fitting. This research first analyses the behaviour of existing...
bachelor thesis 2022
document
Bhaskaran, Prajit (author)
A learning curve displays the measure of accuracy/error on test data of a machine learning algorithm trained on different amounts of training data. They can be modeled by parametric curve models that help predict accuracy improvement through curve extrapolation methods. However, these learning curves have only been mainly generated from default...
bachelor thesis 2022
document
Tempelman, Philip (author)
Program synthesis is used in various ways to automate repetitive tasks or to generate software automatically. Search-based program synthesis constitutes searching the space of candidate programs created from a given language. However, this form of program synthesis is very expensive in terms of computing power. By optimising the synthesiser’s...
bachelor thesis 2022
Searched for: contributor%3A%22Smaragdakis%2C+G.+%28graduation+committee%29%22
(1 - 20 of 25)

Pages