Pages
- 1
- 2
- document
-
Al-Kaswan, A. (author), Ahmed, Toufique (author), Izadi, M. (author), Sawant, Anand Ashok (author), Devanbu, Premkumar (author), van Deursen, A. (author)Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, reverse engineering is time-consuming, much of which is taken up by labelling the functions with semantic...conference paper 2023
- document
-
Al-Kaswan, Ali (author)Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...master thesis 2022
- document
-
Pashov, Atanas (author)The aim of this research is to provide a structured approach for dynamically analysing Android applications, focusing on applications that block or flag suspected spam caller IDs. This paper discusses ways to determine how an application stores the data regarding the phone numbers, and what APIs it utilizes. In order to develop a methodology of...bachelor thesis 2022
- document
-
de Jong, Victor (author)Applications on Android phones which block spam calls could be argued a necessity for people unfortunate enough to have their number on spam lists. Third-party applications provide exten- sive, up-to-date blocklists to screen incoming calls. This paper analyses and describes how these types of applications store and access their data. First we...bachelor thesis 2022
- document
-
Grosveld, Marcus (author)The conflictual past of Beirut is being erased by the company of Solidere, which has a strong will to modernise, through a highly destructive reconstruction, in an effort to heal the city. With this project, a new approach is taken on, in which an old concrete structure, riddled with bullet holes, part of the great variety of dilapidated and...master thesis 2021
- document
-
Breurkes, Arthur (author)Database entity type recognition is the practice of recognizing conceptual entity types for which given data sets contain data. In big data or data lake settings, it is not always known which conceptual entity types are represented in each data set, making it difficult to extract value from the data. Depending on the logical schemas, each...master thesis 2021
- document
-
Oosthoek, K. (author), Dörr, C. (author)The Cyber Threat Intelligence (CTI) field has evolved rapidly and most of its reporting is now fairly stan-dardized. Where the Cyber Kill Chain was its sole reference framework 5 years ago, today ATT&CK is the de facto standard for reporting adversary tactics, techniques and procedures (TTPs). CTI frameworks are effectively abstraction...conference paper 2021
- document
-
Baldi, N. (author), de Valk, S.C. (author), Sousa-Silva, Maria (author), Casal, Margarida (author), Soares-Silva, Isabel (author), Mans, R. (author)In Saccharomyces cerevisiae, the complete set of proteins involved in transport of lactic acid across the cell membrane has not been determined. In this study, we aimed to identify transport proteins not previously described to be involved in lactic acid transport via a combination of directed evolution, whole-genome resequencing and reverse...journal article 2021
- document
-
Harrewijn, T.L. (author), Vergoossen, R.P.H. (author), Lantsoght, E.O.L. (author)Most bridges in the Dutch infrastructure are built before 1985 and have experienced increasing traffic intensities and loads. On the other hand, the structural (design) codes have changed over the years. A frequently faced problem in practice is that the original design calculations and technical drawings of a large percentage of the existing...conference paper 2020
- document
-
Eigenraam, P. (author), Borgart, A. (author), Chilton, John (author), Li, Qingpeng (author)This paper presents a detailed structural analysis of a bubble shell engineered by Heinz Isler. Through 3D scanning the geometry of this shell structure has become available to the authors. Structural analysis has not been possible before since the geometry of the shell was not available. The bubble shell was Isler’s most built type of shell. In...journal article 2020
- document
-
Harrewijn, Thomas (author)Most bridges in the Western European road networks are ageing. The vast majority of about 90% of these bridges have reinforced concrete as a building material. The traffic intensity, as well as the axle, and the average vehicle weight have increased since these structures were opened to traffic. Furthermore, the structural (design) codes have...master thesis 2019
- document
-
de Haan, Mick (author)Architectural engineering is evolving from a traditional craftsmanship to a new digital craftsmanship. Through advancements in production and processing techniques, we can achieve both mass production and offer mass customisation. As for the typology shown below, a simple house [1] & [2], the source of the material did not alter. The...master thesis 2017
- document
-
Marques, W.L. (author), Mans, R. (author), Marella, Eko Roy (author), Cordeiro, Rosa Lorizolla (author), van den Broek, M.A. (author), Daran, J.G. (author), Pronk, J.T. (author), Gombert, Andreas K. (author), van Maris, A.J.A. (author)Many relevant options to improve efficacy and kinetics of sucrose metabolism in Saccharomyces cerevisiae and, thereby, the economics of sucrose-based processes remain to be investigated. An essential first step is to identify all native sucrose-hydrolysing enzymes and sucrose transporters in this yeast, including those that can be activated...journal article 2017
- document
-
Janssen, M. (author)Software obfuscation is widely applied to prevent reverse engineering of applications. However, to evaluate security and validate behaviour we are interested in analysis such software. In this thesis, we give an overview of available obfuscation techniques as well as methods to undo this effort through reverse engineering and deobfuscation. We...master thesis 2016
- document
-
Eigenraam, P. (author), Borgart, A. (author)Many free form shell structures that have been designed and build in previous decades are fascinating structures. We can learn from these structures by analysing them and studying their structural behaviour. However, in some cases the geometry of these structures is not available; most notably the shapes of shell structures designed and build by...journal article 2016
- document
-
Oud, B. (author), Guadalupe-Medina, V. (author), Nijkamp, J.F. (author), De Ridder, D. (author), Pronk, J.T. (author), Van Maris, A.J.A. (author), Daran, J.G. (author)Laboratory evolution of the yeast Saccharomyces cerevisiae in bioreactor batch cultures yielded variants that grow as multicellular, fast-sedimenting clusters. Knowledge of the molecular basis of this phenomenon may contribute to the understanding of natural evolution of multicellularity and to manipulating cell sedimentation in laboratory and...journal article 2013
- document
-
Greiler, M.S. (author)The two main topics of this dissertation are plug-in-based systems and test suite comprehension. In particular, challenges during testing plug-in-based systems are revealed, and reverse engineering based techniques to support developers during test suite comprehension are presented.doctoral thesis 2013
- document
-
Zaidman, A.E. (author), Matthijssen, N. (author), Storey, M.A. (author), Van Deursen, A. (author)Ajax-enabled Web applications are a new breed of highly interactive, highly dynamic Web applications. Although Ajax allows developers to create rich Web applications, Ajax applications can be difficult to comprehend and thus to maintain. For this reason, we have created FireDetective, a tool that uses dynamic analysis at both the client (browser...journal article 2012
- document
-
Sabelis, S.C. (author)Nowadays a lot of small companies maintain multiple websites that require the user to sign up for ordering products or extended interaction. The users have to create an account for each website the company owns, creating duplicate information for the company and forcing the customer to remember multiple accounts. Where big companies can solve...master thesis 2011
- document
-
Metselaar, P.A. (author)By evaluating the architecture of a software system, ways to improve the system's quality attributes (such as its performance and modifiability) can be identified and valuable lessons can be learned which may also be applied to other systems. An architecture evaluation requires an up-to-date description of the architecture, which is often...master thesis 2010
Pages
- 1
- 2