Searched for: subject%3A%22Exploitation%22
(1 - 20 of 31)

Pages

document
Horvath, I. (author)
System knowledge and reasoning mechanisms are essential means for intellectualization of cyber-physical systems (CPSs). As enablers of system intelligence, they make such systems able to solve application problems and to maintain their efficient operation. Normally, system intelligence has a human-created initial part and a system-produced ...
journal article 2024
document
Ariana, Ramin (author)
Swarm robotics (SR) is an emerging field of research that utilizes a swarm of robots that work together as a team to solve complex problems. One such challenge in SR is the exploration of unknown environments to find multiple targets. This problem finds applications in various domains, such as archaeology, underground exploration, signal source...
master thesis 2023
document
Bleekemolen, Sophie (author)
The issue of labour exploitation in the Netherlands has been gaining more attention lately. Regularly stories appear in the news in which employees are treated inhumanely by their employer, work in unsafe conditions, or live in unhealthy accommodations. The issue has also been gaining attention in politics. The advice of Aanjaagteam Bescherming...
master thesis 2023
document
Al Alsadi, Arwa (author), Sameshima, Kaichi (author), Yoshioka, Katsunari (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
For years, attackers have exploited vulnerabilities in Internet of Things (IoT) devices. Previous research has examined target selection in cybercrime, but there has been little investigation into the factors that influence target selection in attacks on IoT. This study aims to better understand how attackers choose their targets by analyzing...
conference paper 2023
document
Horvath, I. (author)
Cyber-physical systems (CPSs) are seen as one of the tangible results of the convergence of advanced information technology, nanotechnology, biotechnology, cognitive science, and social science in addition to conventional systems science, engineering, and technologies. Designing next-generation cyber-physical systems (NG-CPSs) is a...
journal article 2023
document
Weegink, Stefan (author)
There is an everlasting struggle for organisations to remediate vulnerabilities in IT systems before being the victim of an exploitation. Organisations try to reduce this struggle by turning to specialized cyber organisations, which use their expertise to recommend resolving a subset of vulnerabilities. Unfortunately, the process of recommending...
master thesis 2022
document
Huisman, Rick (author)
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...
master thesis 2022
document
van Hooff, Sam (author)
The growing number of software vulnerabilities being disclosed is posing a challenge to many organisations. With limited patching resources and only a fraction of the vulnerabilities posing a real threat, prioritization is key. Current prioritization methods, such as CVSS, are failing and are sometimes no better than random guessing. Exploit...
master thesis 2022
document
Hafkemeyer, Linus (author)
As more and more aspects of our society and economy rely on software, security vulnerabilities in programs have become an increasingly significant threat. One such class of vulnerabilities are out-of-bounds writes, which are still one of the most widespread and dangerous types of security bugs in memory-unsafe programming languages five decades...
master thesis 2022
document
van de Werken, Nathalie (author)
A recent development in program synthesis is using Monte Carlo Tree Search to traverse the search tree of possible programs in order to efficiently find a program that will successfully transform the given input to the desired output. Previous research has shown promising results as Monte Carlo Tree Search is able to escape local optima that...
bachelor thesis 2022
document
Meijers, Willem (author)
The autonomy of mobile robots has been greatly improved in recent decades. For these robots, the field of search and rescue is of particular interest. This thesis introduces a new method to let a mobile robot (Spot by Boston Dynamics) explore and search for victims in unknown environments. Existing methods include coverage, which aims to fully...
master thesis 2022
document
Al Alsadi, Arwa (author), Sameshima, Kaichi (author), Bleier, Jakob (author), Yoshioka, Katsunari (author), Lindorfer, Martina (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Internet to the first infection attempts. Still, we know little about the evolution of exploit...
conference paper 2022
document
MISHRA PARASNATH, PUNITH (author)
Diversity as a topic is increasingly becoming important aspect of organizations and society in general. Team diversity could bring different perspectives and thus diverse teams could reap the benefits such as better performance, innovation, and problem-solving abilities. Teams face challenge of deciding between alignment activities focused on...
master thesis 2021
document
Tumkur Venkatesh, Aishwarya (author)
The study aims to add to the existing knowledge base on individual ambidexterity by adopting a trait-based approach. As this area of individual ambidexterity is still comparatively new, limited study has been undertaken on the internal factors that determine individual ambidexterity. Further the study addresses the degree to which personality...
master thesis 2021
document
Liu, Y. (author)
Over the last decades of development of knowledge management and organizational learning, there has been an increase in learning research within and across projects. Learning from past lessons in projects and preparing for the next project management practices is very important in large infrastructure projects. The autonomy of projects brings...
doctoral thesis 2021
document
de Bruijn, E.A. (author), Bloemendal, Martin (author), ter Borgh, M.M. (author), Godderij, R.R.G.G. (author), Vossepoel, F.C. (author)
Geothermal operations are expanding and increasingly contributing to the current energy supply. Assessing the long-term operable lifetime of these projects is complicated as the reservoirs they produce from are often deep and subsurface properties are uncertain and spatially variable. The minimum lifetime of a geothermal project usually...
journal article 2021
document
van Roessel, L. (author)
Active inference is a process theory arising from neuroscience which casts perception, action, planning and learning under one optimisation criterion: minimisation of free energy. Current literature on the implementation of discrete state-space active inference focuses on scalability, the comparison to reinforcement learning and its performance...
master thesis 2020
document
Meurs, Henk (author), Sharmeen, F. (author), Marchau, V.A.W.J. (author), van der Heijden, Rob (author)
Mobility as a Service (MaaS) involves integration of various forms of public and private transport services into a single mobility service, accessible on demand. For MaaS to become successful, different suppliers of transport services have to cooperate in alliances in order to bring new benefits in the short and long term. Past experience...
journal article 2020
document
Liu, Y. (author), Hertogh, M.J.C.M. (author), Houwing, E.J. (author)
Purpose - How learning is facilitated in inter-organizational projects remains underdeveloped in the literature. The aim of this study is to focus on viewing the relationship between the multiple organizations in a project, from a perspective of the learning aspect. Design/Methodology/Approach - This research analyses the learning trajectory...
book chapter 2019
document
Gnana, Abhinaya (author)
The exploitation of resources and minerals from the earth’s surface for the benefits of mankind is a common practice all over the world for many decades. Usually, the excavation of mines and quarries is regarded as a purely economic process. There is no consideration about the way in which the excavations are changing the landscape spatially and...
master thesis 2018
Searched for: subject%3A%22Exploitation%22
(1 - 20 of 31)

Pages