Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Reverse Engineering). Showing records 1 – 30 of 471 total matches.

[1] [2] [3] [4] [5] … [16]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Texas – Austin

1. Head, Todd Connell. Reverse engineering toolbox.

Degree: Science and Mathematics Education, 2011, University of Texas – Austin

 A reverse engineering toolbox containing measurement and disassembly tools needed to reverse engineer products in a high school engineering classroom would be helpful to many… (more)

Subjects/Keywords: Reverse engineering; Toolbox; Reverse engineering toolbox

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Head, T. C. (2011). Reverse engineering toolbox. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-08-4298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Head, Todd Connell. “Reverse engineering toolbox.” 2011. Thesis, University of Texas – Austin. Accessed April 25, 2019. http://hdl.handle.net/2152/ETD-UT-2011-08-4298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Head, Todd Connell. “Reverse engineering toolbox.” 2011. Web. 25 Apr 2019.

Vancouver:

Head TC. Reverse engineering toolbox. [Internet] [Thesis]. University of Texas – Austin; 2011. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Head TC. Reverse engineering toolbox. [Thesis]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

2. Howard, Nicole Lane. Redesigning reverse engineering curriculum.

Degree: Science and Mathematics Education, 2011, University of Texas – Austin

Engineering curricula for high schools has and will become increasingly important as STEM (Science Technology Engineering and Mathematics) education matures and grows across the country.… (more)

Subjects/Keywords: Reverse engineering; Engineering curriculum

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Howard, N. L. (2011). Redesigning reverse engineering curriculum. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-08-4160

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Howard, Nicole Lane. “Redesigning reverse engineering curriculum.” 2011. Thesis, University of Texas – Austin. Accessed April 25, 2019. http://hdl.handle.net/2152/ETD-UT-2011-08-4160.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Howard, Nicole Lane. “Redesigning reverse engineering curriculum.” 2011. Web. 25 Apr 2019.

Vancouver:

Howard NL. Redesigning reverse engineering curriculum. [Internet] [Thesis]. University of Texas – Austin; 2011. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4160.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Howard NL. Redesigning reverse engineering curriculum. [Thesis]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4160

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Sobana S. Identification modeling and control of continuous desalination process using reverse osmosis;.

Degree: Continuous desalination process using reverse osmosis, 2014, Anna University

newline Water scarcity due to global warming and seasonal anomaly has led newlineprocess industries to reuse utility (water) to the maximum extent. If the wastewater… (more)

Subjects/Keywords: Electrical engineering; Reverse osmosis

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

S, S. (2014). Identification modeling and control of continuous desalination process using reverse osmosis;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/16610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

S, Sobana. “Identification modeling and control of continuous desalination process using reverse osmosis;.” 2014. Thesis, Anna University. Accessed April 25, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/16610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

S, Sobana. “Identification modeling and control of continuous desalination process using reverse osmosis;.” 2014. Web. 25 Apr 2019.

Vancouver:

S S. Identification modeling and control of continuous desalination process using reverse osmosis;. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Apr 25]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/16610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

S S. Identification modeling and control of continuous desalination process using reverse osmosis;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/16610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Virginia

4. Hayes, Roy. Action-based Feature Representation for Reverse Engineering Trading Strategies.

Degree: MS, System and Information Engineering, 2013, University of Virginia

 Stock trades now take place at unprecedented speeds. Aided by trading algorithms, market professionals can now buy and sell securities within milliseconds. These algorithms are… (more)

Subjects/Keywords: Reverse Engineering; Algorithms; Finance; Trading

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hayes, R. (2013). Action-based Feature Representation for Reverse Engineering Trading Strategies. (Doctoral Dissertation). University of Virginia. Retrieved from http://libra.virginia.edu/catalog/libra-oa:2822

Chicago Manual of Style (16th Edition):

Hayes, Roy. “Action-based Feature Representation for Reverse Engineering Trading Strategies.” 2013. Doctoral Dissertation, University of Virginia. Accessed April 25, 2019. http://libra.virginia.edu/catalog/libra-oa:2822.

MLA Handbook (7th Edition):

Hayes, Roy. “Action-based Feature Representation for Reverse Engineering Trading Strategies.” 2013. Web. 25 Apr 2019.

Vancouver:

Hayes R. Action-based Feature Representation for Reverse Engineering Trading Strategies. [Internet] [Doctoral dissertation]. University of Virginia; 2013. [cited 2019 Apr 25]. Available from: http://libra.virginia.edu/catalog/libra-oa:2822.

Council of Science Editors:

Hayes R. Action-based Feature Representation for Reverse Engineering Trading Strategies. [Doctoral Dissertation]. University of Virginia; 2013. Available from: http://libra.virginia.edu/catalog/libra-oa:2822


University of Hong Kong

5. 劉春雨; Liu, Chunyu. Surface reconstruction from 3-D measurement data.

Degree: PhD, 1999, University of Hong Kong

published_or_final_version

Mechanical Engineering

Doctoral

Doctor of Philosophy

Subjects/Keywords: Reverse engineering.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

劉春雨; Liu, C. (1999). Surface reconstruction from 3-D measurement data. (Doctoral Dissertation). University of Hong Kong. Retrieved from Liu, C. [劉春雨]. (1999). Surface reconstruction from 3-D measurement data. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b3124060 ; http://dx.doi.org/10.5353/th_b3124060 ; http://hdl.handle.net/10722/35703

Chicago Manual of Style (16th Edition):

劉春雨; Liu, Chunyu. “Surface reconstruction from 3-D measurement data.” 1999. Doctoral Dissertation, University of Hong Kong. Accessed April 25, 2019. Liu, C. [劉春雨]. (1999). Surface reconstruction from 3-D measurement data. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b3124060 ; http://dx.doi.org/10.5353/th_b3124060 ; http://hdl.handle.net/10722/35703.

MLA Handbook (7th Edition):

劉春雨; Liu, Chunyu. “Surface reconstruction from 3-D measurement data.” 1999. Web. 25 Apr 2019.

Vancouver:

劉春雨; Liu C. Surface reconstruction from 3-D measurement data. [Internet] [Doctoral dissertation]. University of Hong Kong; 1999. [cited 2019 Apr 25]. Available from: Liu, C. [劉春雨]. (1999). Surface reconstruction from 3-D measurement data. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b3124060 ; http://dx.doi.org/10.5353/th_b3124060 ; http://hdl.handle.net/10722/35703.

Council of Science Editors:

劉春雨; Liu C. Surface reconstruction from 3-D measurement data. [Doctoral Dissertation]. University of Hong Kong; 1999. Available from: Liu, C. [劉春雨]. (1999). Surface reconstruction from 3-D measurement data. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b3124060 ; http://dx.doi.org/10.5353/th_b3124060 ; http://hdl.handle.net/10722/35703


Penn State University

6. Lageman, Nathaniel John. BinDNN: Resilient Function Matching Using Deep Learning.

Degree: MS, Computer Science and Engineering, 2016, Penn State University

 Determining if two functions taken from different compiled binaries originate from the same function in the source code has many applications to malware reverse engineering.… (more)

Subjects/Keywords: reverse engineering; malware; deep learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lageman, N. J. (2016). BinDNN: Resilient Function Matching Using Deep Learning. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/12477njl5114

Chicago Manual of Style (16th Edition):

Lageman, Nathaniel John. “BinDNN: Resilient Function Matching Using Deep Learning.” 2016. Masters Thesis, Penn State University. Accessed April 25, 2019. https://etda.libraries.psu.edu/catalog/12477njl5114.

MLA Handbook (7th Edition):

Lageman, Nathaniel John. “BinDNN: Resilient Function Matching Using Deep Learning.” 2016. Web. 25 Apr 2019.

Vancouver:

Lageman NJ. BinDNN: Resilient Function Matching Using Deep Learning. [Internet] [Masters thesis]. Penn State University; 2016. [cited 2019 Apr 25]. Available from: https://etda.libraries.psu.edu/catalog/12477njl5114.

Council of Science Editors:

Lageman NJ. BinDNN: Resilient Function Matching Using Deep Learning. [Masters Thesis]. Penn State University; 2016. Available from: https://etda.libraries.psu.edu/catalog/12477njl5114


University of Victoria

7. Chan, Vincent Harry. Feature based reverse engineering employing automated multi-sensor scanning.

Degree: Department of Mechanical Engineering, 2017, University of Victoria

Reverse engineering of geometric models is the process of creating a computer aided model from an existing physical part so that subsequent manufacturing processes may… (more)

Subjects/Keywords: Reverse engineering; Lasers; Scanning systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chan, V. H. (2017). Feature based reverse engineering employing automated multi-sensor scanning. (Thesis). University of Victoria. Retrieved from https://dspace.library.uvic.ca//handle/1828/8860

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chan, Vincent Harry. “Feature based reverse engineering employing automated multi-sensor scanning.” 2017. Thesis, University of Victoria. Accessed April 25, 2019. https://dspace.library.uvic.ca//handle/1828/8860.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chan, Vincent Harry. “Feature based reverse engineering employing automated multi-sensor scanning.” 2017. Web. 25 Apr 2019.

Vancouver:

Chan VH. Feature based reverse engineering employing automated multi-sensor scanning. [Internet] [Thesis]. University of Victoria; 2017. [cited 2019 Apr 25]. Available from: https://dspace.library.uvic.ca//handle/1828/8860.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chan VH. Feature based reverse engineering employing automated multi-sensor scanning. [Thesis]. University of Victoria; 2017. Available from: https://dspace.library.uvic.ca//handle/1828/8860

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. TAN HWEE LYNN, CYRENE. A multi-sensor approach for reverse engineering of an object.

Degree: 2004, National University of Singapore

Subjects/Keywords: Reverse Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

TAN HWEE LYNN, C. (2004). A multi-sensor approach for reverse engineering of an object. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/13977 ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/1/bitstream ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/2/bitstream

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

TAN HWEE LYNN, CYRENE. “A multi-sensor approach for reverse engineering of an object.” 2004. Thesis, National University of Singapore. Accessed April 25, 2019. http://scholarbank.nus.edu.sg/handle/10635/13977 ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/1/bitstream ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/2/bitstream.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

TAN HWEE LYNN, CYRENE. “A multi-sensor approach for reverse engineering of an object.” 2004. Web. 25 Apr 2019.

Vancouver:

TAN HWEE LYNN C. A multi-sensor approach for reverse engineering of an object. [Internet] [Thesis]. National University of Singapore; 2004. [cited 2019 Apr 25]. Available from: http://scholarbank.nus.edu.sg/handle/10635/13977 ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/1/bitstream ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/2/bitstream.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

TAN HWEE LYNN C. A multi-sensor approach for reverse engineering of an object. [Thesis]. National University of Singapore; 2004. Available from: http://scholarbank.nus.edu.sg/handle/10635/13977 ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/1/bitstream ; http://scholarbank.nus.edu.sg/bitstream/10635%2F13977/2/bitstream

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

9. Clark, Cheryl Beth. Reverse Engineering for freshman through seniors.

Degree: Curriculum and Instruction, 2015, University of Texas – Austin

Reverse Engineering is the process of discovering the workings of a device or system through analysis. It is a high interest activity for high school… (more)

Subjects/Keywords: Reverse Engineering; High school; MASEE

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clark, C. B. (2015). Reverse Engineering for freshman through seniors. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/32271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Clark, Cheryl Beth. “Reverse Engineering for freshman through seniors.” 2015. Thesis, University of Texas – Austin. Accessed April 25, 2019. http://hdl.handle.net/2152/32271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Clark, Cheryl Beth. “Reverse Engineering for freshman through seniors.” 2015. Web. 25 Apr 2019.

Vancouver:

Clark CB. Reverse Engineering for freshman through seniors. [Internet] [Thesis]. University of Texas – Austin; 2015. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/2152/32271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Clark CB. Reverse Engineering for freshman through seniors. [Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/32271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brigham Young University

10. LeBaron, Devin Donald. Using Topology Optimization to Numerically Improve Barriers to Reverse Engineering.

Degree: MS, 2013, Brigham Young University

 Here explored is a method by which designers can use the tool of topology optimization to numerically improve barriers to reverse engineering. Recently developed metrics,… (more)

Subjects/Keywords: reverse engineering; topology optimization; barriers to reverse engineering; Mechanical Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LeBaron, D. D. (2013). Using Topology Optimization to Numerically Improve Barriers to Reverse Engineering. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=4786&context=etd

Chicago Manual of Style (16th Edition):

LeBaron, Devin Donald. “Using Topology Optimization to Numerically Improve Barriers to Reverse Engineering.” 2013. Masters Thesis, Brigham Young University. Accessed April 25, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=4786&context=etd.

MLA Handbook (7th Edition):

LeBaron, Devin Donald. “Using Topology Optimization to Numerically Improve Barriers to Reverse Engineering.” 2013. Web. 25 Apr 2019.

Vancouver:

LeBaron DD. Using Topology Optimization to Numerically Improve Barriers to Reverse Engineering. [Internet] [Masters thesis]. Brigham Young University; 2013. [cited 2019 Apr 25]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=4786&context=etd.

Council of Science Editors:

LeBaron DD. Using Topology Optimization to Numerically Improve Barriers to Reverse Engineering. [Masters Thesis]. Brigham Young University; 2013. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=4786&context=etd


San Jose State University

11. Kundu, Deepti. Jshield: A Java Anti-Reversing Tool.

Degree: MS, Computer Science, 2011, San Jose State University

  Java is a platform-independent language. Java programs can be executed on any machine, irrespective of its hardware or operating system, as long as a… (more)

Subjects/Keywords: Anti-Reverse Engineering; Obfuscation; Protect Java; Reverse Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kundu, D. (2011). Jshield: A Java Anti-Reversing Tool. (Masters Thesis). San Jose State University. Retrieved from https://scholarworks.sjsu.edu/etd_theses/3937

Chicago Manual of Style (16th Edition):

Kundu, Deepti. “Jshield: A Java Anti-Reversing Tool.” 2011. Masters Thesis, San Jose State University. Accessed April 25, 2019. https://scholarworks.sjsu.edu/etd_theses/3937.

MLA Handbook (7th Edition):

Kundu, Deepti. “Jshield: A Java Anti-Reversing Tool.” 2011. Web. 25 Apr 2019.

Vancouver:

Kundu D. Jshield: A Java Anti-Reversing Tool. [Internet] [Masters thesis]. San Jose State University; 2011. [cited 2019 Apr 25]. Available from: https://scholarworks.sjsu.edu/etd_theses/3937.

Council of Science Editors:

Kundu D. Jshield: A Java Anti-Reversing Tool. [Masters Thesis]. San Jose State University; 2011. Available from: https://scholarworks.sjsu.edu/etd_theses/3937


Linnaeus University

12. Niculae, Danut. General Unpacking : Overview and Techniques.

Degree: Computer Science, 2015, Linnaeus University

  Over the years, packed malware have started to appear at a more rapid pace.Hackers are modifying the source code of popular packers to create… (more)

Subjects/Keywords: Protections; Reverse Engineering; Unpacking; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Niculae, D. (2015). General Unpacking : Overview and Techniques. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Niculae, Danut. “General Unpacking : Overview and Techniques.” 2015. Thesis, Linnaeus University. Accessed April 25, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Niculae, Danut. “General Unpacking : Overview and Techniques.” 2015. Web. 25 Apr 2019.

Vancouver:

Niculae D. General Unpacking : Overview and Techniques. [Internet] [Thesis]. Linnaeus University; 2015. [cited 2019 Apr 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Niculae D. General Unpacking : Overview and Techniques. [Thesis]. Linnaeus University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

13. Pucsek, Dean W. Visualization and analysis of assembly code in an integrated comprehension environment.

Degree: Dept. of Computer Science, 2013, University of Victoria

 Computing has reached a point where it is visible in almost every aspect of one’s daily activities. Consider, for example, a typical household. There will… (more)

Subjects/Keywords: assembly code; visualization; reverse engineering; software engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pucsek, D. W. (2013). Visualization and analysis of assembly code in an integrated comprehension environment. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/4665

Chicago Manual of Style (16th Edition):

Pucsek, Dean W. “Visualization and analysis of assembly code in an integrated comprehension environment.” 2013. Masters Thesis, University of Victoria. Accessed April 25, 2019. http://hdl.handle.net/1828/4665.

MLA Handbook (7th Edition):

Pucsek, Dean W. “Visualization and analysis of assembly code in an integrated comprehension environment.” 2013. Web. 25 Apr 2019.

Vancouver:

Pucsek DW. Visualization and analysis of assembly code in an integrated comprehension environment. [Internet] [Masters thesis]. University of Victoria; 2013. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/1828/4665.

Council of Science Editors:

Pucsek DW. Visualization and analysis of assembly code in an integrated comprehension environment. [Masters Thesis]. University of Victoria; 2013. Available from: http://hdl.handle.net/1828/4665


Wright State University

14. Rematska, Giorgia. A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents.

Degree: PhD, Computer Science and Engineering PhD, 2018, Wright State University

 Systems Reverse Engineering has gained great attention over time and is associated with numerous different research areas. The importance of this research derives from several… (more)

Subjects/Keywords: Computer Science; Computer Engineering; systems reverse engineering; reverse engineering; technical document; stochastic Petri-net

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rematska, G. (2018). A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents. (Doctoral Dissertation). Wright State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=wright1527109224100775

Chicago Manual of Style (16th Edition):

Rematska, Giorgia. “A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents.” 2018. Doctoral Dissertation, Wright State University. Accessed April 25, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1527109224100775.

MLA Handbook (7th Edition):

Rematska, Giorgia. “A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents.” 2018. Web. 25 Apr 2019.

Vancouver:

Rematska G. A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents. [Internet] [Doctoral dissertation]. Wright State University; 2018. [cited 2019 Apr 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1527109224100775.

Council of Science Editors:

Rematska G. A Stochastic Petri Net Reverse Engineering Methodology for Deep Understanding of Technical Documents. [Doctoral Dissertation]. Wright State University; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1527109224100775


Brigham Young University

15. Anderson, Nicole. Characterization of the Initial Flow Rate of Information During Reverse Engineering.

Degree: MS, 2011, Brigham Young University

 The future of companies that are founded on the development of new and innovative products is threatened when competitors reverse engineer and imitate the products.… (more)

Subjects/Keywords: Reverse engineering; product development; flow rate of information; barriers to reverse engineering; Mechanical Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, N. (2011). Characterization of the Initial Flow Rate of Information During Reverse Engineering. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3631&context=etd

Chicago Manual of Style (16th Edition):

Anderson, Nicole. “Characterization of the Initial Flow Rate of Information During Reverse Engineering.” 2011. Masters Thesis, Brigham Young University. Accessed April 25, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3631&context=etd.

MLA Handbook (7th Edition):

Anderson, Nicole. “Characterization of the Initial Flow Rate of Information During Reverse Engineering.” 2011. Web. 25 Apr 2019.

Vancouver:

Anderson N. Characterization of the Initial Flow Rate of Information During Reverse Engineering. [Internet] [Masters thesis]. Brigham Young University; 2011. [cited 2019 Apr 25]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3631&context=etd.

Council of Science Editors:

Anderson N. Characterization of the Initial Flow Rate of Information During Reverse Engineering. [Masters Thesis]. Brigham Young University; 2011. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3631&context=etd


Ruhr Universität Bochum

16. Hund, Ralf. Analysis and retrotting of security properties for proprietary software systems.

Degree: 2013, Ruhr Universität Bochum

 Die vorliegende Dissertation befasst sich mit der Entwicklung neuer Methoden zur Analyse und nachträglichen Erweiterung von Sicherheitseigenschaften von Softwaresystemen. Die Arbeit konzentriert sich dabei auf… (more)

Subjects/Keywords: Computersicherheit; Reverse Engineering; Programmanalyse; Kontrollfluss; Gerätesicherheit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hund, R. (2013). Analysis and retrotting of security properties for proprietary software systems. (Thesis). Ruhr Universität Bochum. Retrieved from http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-37904

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hund, Ralf. “Analysis and retrotting of security properties for proprietary software systems.” 2013. Thesis, Ruhr Universität Bochum. Accessed April 25, 2019. http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-37904.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hund, Ralf. “Analysis and retrotting of security properties for proprietary software systems.” 2013. Web. 25 Apr 2019.

Vancouver:

Hund R. Analysis and retrotting of security properties for proprietary software systems. [Internet] [Thesis]. Ruhr Universität Bochum; 2013. [cited 2019 Apr 25]. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-37904.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hund R. Analysis and retrotting of security properties for proprietary software systems. [Thesis]. Ruhr Universität Bochum; 2013. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-37904

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ruhr Universität Bochum

17. Willems, Carsten. Instrumenting existing system components for dynamic analysis of malicious software.

Degree: 2013, Ruhr Universität Bochum

 Die Analyse unbekannter Software und Rekonstruktion ihrer Funktionalität ist eine wichtige Aufgabe. Im Kontext von Schadsoftware dient sie der Entwicklung von Schutzmechanismen sowie Sicherheitssoftware und… (more)

Subjects/Keywords: Malware; Dynamische Analyse; Instrumentation; Reverse Engineering; Programmanalyse

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Willems, C. (2013). Instrumenting existing system components for dynamic analysis of malicious software. (Thesis). Ruhr Universität Bochum. Retrieved from http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-38044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Willems, Carsten. “Instrumenting existing system components for dynamic analysis of malicious software.” 2013. Thesis, Ruhr Universität Bochum. Accessed April 25, 2019. http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-38044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Willems, Carsten. “Instrumenting existing system components for dynamic analysis of malicious software.” 2013. Web. 25 Apr 2019.

Vancouver:

Willems C. Instrumenting existing system components for dynamic analysis of malicious software. [Internet] [Thesis]. Ruhr Universität Bochum; 2013. [cited 2019 Apr 25]. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-38044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Willems C. Instrumenting existing system components for dynamic analysis of malicious software. [Thesis]. Ruhr Universität Bochum; 2013. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-38044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Virginia

18. Ghosh, Sudeep. Software Protection via Composable Process-level Virtual Machines.

Degree: PhD, Computer Engineering, 2013, University of Virginia

Complex hardware/software systems are ubiquitous, affecting every aspect of daily life. Software is integral to the normal functioning of critical systems such as power plants,… (more)

Subjects/Keywords: Software tamper resistance; reverse engineering; program protections

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghosh, S. (2013). Software Protection via Composable Process-level Virtual Machines. (Doctoral Dissertation). University of Virginia. Retrieved from http://libra.virginia.edu/catalog/libra-oa:3904

Chicago Manual of Style (16th Edition):

Ghosh, Sudeep. “Software Protection via Composable Process-level Virtual Machines.” 2013. Doctoral Dissertation, University of Virginia. Accessed April 25, 2019. http://libra.virginia.edu/catalog/libra-oa:3904.

MLA Handbook (7th Edition):

Ghosh, Sudeep. “Software Protection via Composable Process-level Virtual Machines.” 2013. Web. 25 Apr 2019.

Vancouver:

Ghosh S. Software Protection via Composable Process-level Virtual Machines. [Internet] [Doctoral dissertation]. University of Virginia; 2013. [cited 2019 Apr 25]. Available from: http://libra.virginia.edu/catalog/libra-oa:3904.

Council of Science Editors:

Ghosh S. Software Protection via Composable Process-level Virtual Machines. [Doctoral Dissertation]. University of Virginia; 2013. Available from: http://libra.virginia.edu/catalog/libra-oa:3904


Queens University

19. Wang, Zhen. System Identification Methods For Reverse Engineering Gene Regulatory Networks .

Degree: Computing, 2010, Queens University

 With the advent of high throughput measurement technologies, large scale gene expression data are available for analysis. Various computational methods have been introduced to analyze… (more)

Subjects/Keywords: system identification; reverse engineering; gene regulatory networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Z. (2010). System Identification Methods For Reverse Engineering Gene Regulatory Networks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/6167

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Zhen. “System Identification Methods For Reverse Engineering Gene Regulatory Networks .” 2010. Thesis, Queens University. Accessed April 25, 2019. http://hdl.handle.net/1974/6167.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Zhen. “System Identification Methods For Reverse Engineering Gene Regulatory Networks .” 2010. Web. 25 Apr 2019.

Vancouver:

Wang Z. System Identification Methods For Reverse Engineering Gene Regulatory Networks . [Internet] [Thesis]. Queens University; 2010. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/1974/6167.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Z. System Identification Methods For Reverse Engineering Gene Regulatory Networks . [Thesis]. Queens University; 2010. Available from: http://hdl.handle.net/1974/6167

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Μανδρώζος, Ασημάκης. Αντίστροφη μηχανίκευση συστημάτων διαχείρισης περιεχομένου ανοιχτού κώδικα σε επίπεδο μοντέλου.

Degree: 2013, University of Patras

Τα συστήματα διαχείρισης περιεχομένου (Content Management Systems) χρησιμοποιούνται ευρέως στην κατασκευή εφαρμογών του παγκόσμιου ιστού. Το κυριότερο πλεονέκτημά τους είναι ότι άνθρωποι που δεν γνωρίζουν… (more)

Subjects/Keywords: Αντίστροη μηχανίκευση; 006.78; Reverse engineering; Joomla!; WebML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Μανδρώζος, . (2013). Αντίστροφη μηχανίκευση συστημάτων διαχείρισης περιεχομένου ανοιχτού κώδικα σε επίπεδο μοντέλου. (Masters Thesis). University of Patras. Retrieved from http://hdl.handle.net/10889/6038

Chicago Manual of Style (16th Edition):

Μανδρώζος, Ασημάκης. “Αντίστροφη μηχανίκευση συστημάτων διαχείρισης περιεχομένου ανοιχτού κώδικα σε επίπεδο μοντέλου.” 2013. Masters Thesis, University of Patras. Accessed April 25, 2019. http://hdl.handle.net/10889/6038.

MLA Handbook (7th Edition):

Μανδρώζος, Ασημάκης. “Αντίστροφη μηχανίκευση συστημάτων διαχείρισης περιεχομένου ανοιχτού κώδικα σε επίπεδο μοντέλου.” 2013. Web. 25 Apr 2019.

Vancouver:

Μανδρώζος . Αντίστροφη μηχανίκευση συστημάτων διαχείρισης περιεχομένου ανοιχτού κώδικα σε επίπεδο μοντέλου. [Internet] [Masters thesis]. University of Patras; 2013. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/10889/6038.

Council of Science Editors:

Μανδρώζος . Αντίστροφη μηχανίκευση συστημάτων διαχείρισης περιεχομένου ανοιχτού κώδικα σε επίπεδο μοντέλου. [Masters Thesis]. University of Patras; 2013. Available from: http://hdl.handle.net/10889/6038


Northeastern University

21. Johar, Badr O. Inventory control issues in a disassembly line.

Degree: PhD, Department of Mechanical and Industrial Engineering, 2010, Northeastern University

 Recent years have witnessed Reverse Supply Chain (RSC) become the center of attention for researchers and Original Equipment Manufacturers (OEMs). The fast depletion of virgin… (more)

Subjects/Keywords: Disassembly; Inventory Control; Reverse Logistics; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johar, B. O. (2010). Inventory control issues in a disassembly line. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/d20002809

Chicago Manual of Style (16th Edition):

Johar, Badr O. “Inventory control issues in a disassembly line.” 2010. Doctoral Dissertation, Northeastern University. Accessed April 25, 2019. http://hdl.handle.net/2047/d20002809.

MLA Handbook (7th Edition):

Johar, Badr O. “Inventory control issues in a disassembly line.” 2010. Web. 25 Apr 2019.

Vancouver:

Johar BO. Inventory control issues in a disassembly line. [Internet] [Doctoral dissertation]. Northeastern University; 2010. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/2047/d20002809.

Council of Science Editors:

Johar BO. Inventory control issues in a disassembly line. [Doctoral Dissertation]. Northeastern University; 2010. Available from: http://hdl.handle.net/2047/d20002809


University of Manchester

22. Arshad, Rehman. Reverse Engineering Encapsulated components from Legacy Code.

Degree: 2018, University of Manchester

 Component-based development is an approach that revolves around the construction of systems form pre-built modular units (components). If legacy code can be reverse engineered to… (more)

Subjects/Keywords: Component based development; Reverse Engineering; Legacy Code

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arshad, R. (2018). Reverse Engineering Encapsulated components from Legacy Code. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:317350

Chicago Manual of Style (16th Edition):

Arshad, Rehman. “Reverse Engineering Encapsulated components from Legacy Code.” 2018. Doctoral Dissertation, University of Manchester. Accessed April 25, 2019. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:317350.

MLA Handbook (7th Edition):

Arshad, Rehman. “Reverse Engineering Encapsulated components from Legacy Code.” 2018. Web. 25 Apr 2019.

Vancouver:

Arshad R. Reverse Engineering Encapsulated components from Legacy Code. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2019 Apr 25]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:317350.

Council of Science Editors:

Arshad R. Reverse Engineering Encapsulated components from Legacy Code. [Doctoral Dissertation]. University of Manchester; 2018. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:317350

23. Abbasi, Ebrahim. Reverse Engineering Web Congurators.

Degree: 2014, DIAL (Belgium)

In many markets, being competitive echoes with the ability to propose customized products at the same cost and delivery rates as standard ones. As a… (more)

Subjects/Keywords: Software Reverse Engineering; Configuration; Web Technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abbasi, E. (2014). Reverse Engineering Web Congurators. (Thesis). DIAL (Belgium). Retrieved from http://hdl.handle.net/2078.2/147064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abbasi, Ebrahim. “Reverse Engineering Web Congurators.” 2014. Thesis, DIAL (Belgium). Accessed April 25, 2019. http://hdl.handle.net/2078.2/147064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abbasi, Ebrahim. “Reverse Engineering Web Congurators.” 2014. Web. 25 Apr 2019.

Vancouver:

Abbasi E. Reverse Engineering Web Congurators. [Internet] [Thesis]. DIAL (Belgium); 2014. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/2078.2/147064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abbasi E. Reverse Engineering Web Congurators. [Thesis]. DIAL (Belgium); 2014. Available from: http://hdl.handle.net/2078.2/147064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Abbasi, Ebrahim. Reverse Engineering Web Configurators.

Degree: 2014, DIAL (Belgium)

In many markets, being competitive echoes with the ability to propose customized products at the same cost and delivery rates as standard ones. As a… (more)

Subjects/Keywords: Software Reverse Engineering; Configuration; Web Technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abbasi, E. (2014). Reverse Engineering Web Configurators. (Thesis). DIAL (Belgium). Retrieved from http://hdl.handle.net/2078.2/147063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abbasi, Ebrahim. “Reverse Engineering Web Configurators.” 2014. Thesis, DIAL (Belgium). Accessed April 25, 2019. http://hdl.handle.net/2078.2/147063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abbasi, Ebrahim. “Reverse Engineering Web Configurators.” 2014. Web. 25 Apr 2019.

Vancouver:

Abbasi E. Reverse Engineering Web Configurators. [Internet] [Thesis]. DIAL (Belgium); 2014. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/2078.2/147063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abbasi E. Reverse Engineering Web Configurators. [Thesis]. DIAL (Belgium); 2014. Available from: http://hdl.handle.net/2078.2/147063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cornell University

25. Portnoff, Alyse. Ubiquibodies: Engineered Ubiquitin Ligases With Unnatural Substrate Specificity For Targeted Protein Silencing .

Degree: 2014, Cornell University

 The ubiquitin-proteasome pathway (UPP) is the main route of protein degradation in eukaryotic cells and aids in regulation of cell cycle and cellular homeostasis. This… (more)

Subjects/Keywords: protein engineering; targeted proteolysis; reverse genetics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Portnoff, A. (2014). Ubiquibodies: Engineered Ubiquitin Ligases With Unnatural Substrate Specificity For Targeted Protein Silencing . (Thesis). Cornell University. Retrieved from http://hdl.handle.net/1813/36040

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Portnoff, Alyse. “Ubiquibodies: Engineered Ubiquitin Ligases With Unnatural Substrate Specificity For Targeted Protein Silencing .” 2014. Thesis, Cornell University. Accessed April 25, 2019. http://hdl.handle.net/1813/36040.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Portnoff, Alyse. “Ubiquibodies: Engineered Ubiquitin Ligases With Unnatural Substrate Specificity For Targeted Protein Silencing .” 2014. Web. 25 Apr 2019.

Vancouver:

Portnoff A. Ubiquibodies: Engineered Ubiquitin Ligases With Unnatural Substrate Specificity For Targeted Protein Silencing . [Internet] [Thesis]. Cornell University; 2014. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/1813/36040.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Portnoff A. Ubiquibodies: Engineered Ubiquitin Ligases With Unnatural Substrate Specificity For Targeted Protein Silencing . [Thesis]. Cornell University; 2014. Available from: http://hdl.handle.net/1813/36040

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Janssen, M. Combining learning with fuzzing for software deobfuscation:.

Degree: 2016, Delft University of Technology

 Software obfuscation is widely applied to prevent reverse engineering of applications. However, to evaluate security and validate behaviour we are interested in analysis such software.… (more)

Subjects/Keywords: active learning; fuzzing; deobfuscation; reverse engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janssen, M. (2016). Combining learning with fuzzing for software deobfuscation:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce

Chicago Manual of Style (16th Edition):

Janssen, M. “Combining learning with fuzzing for software deobfuscation:.” 2016. Masters Thesis, Delft University of Technology. Accessed April 25, 2019. http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce.

MLA Handbook (7th Edition):

Janssen, M. “Combining learning with fuzzing for software deobfuscation:.” 2016. Web. 25 Apr 2019.

Vancouver:

Janssen M. Combining learning with fuzzing for software deobfuscation:. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2019 Apr 25]. Available from: http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce.

Council of Science Editors:

Janssen M. Combining learning with fuzzing for software deobfuscation:. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:6282cd05-6ae3-4f39-adc7-1a45efe1ccce


Delft University of Technology

27. Metselaar, P.A. Component diagram recovery with dynamic analysis:.

Degree: 2010, Delft University of Technology

 By evaluating the architecture of a software system, ways to improve the system's quality attributes (such as its performance and modifiability) can be identified and… (more)

Subjects/Keywords: dynamic analysis; reverse engineering; software architecture recovery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Metselaar, P. A. (2010). Component diagram recovery with dynamic analysis:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4ab25966-8291-4ad2-bed2-2962262af902

Chicago Manual of Style (16th Edition):

Metselaar, P A. “Component diagram recovery with dynamic analysis:.” 2010. Masters Thesis, Delft University of Technology. Accessed April 25, 2019. http://resolver.tudelft.nl/uuid:4ab25966-8291-4ad2-bed2-2962262af902.

MLA Handbook (7th Edition):

Metselaar, P A. “Component diagram recovery with dynamic analysis:.” 2010. Web. 25 Apr 2019.

Vancouver:

Metselaar PA. Component diagram recovery with dynamic analysis:. [Internet] [Masters thesis]. Delft University of Technology; 2010. [cited 2019 Apr 25]. Available from: http://resolver.tudelft.nl/uuid:4ab25966-8291-4ad2-bed2-2962262af902.

Council of Science Editors:

Metselaar PA. Component diagram recovery with dynamic analysis:. [Masters Thesis]. Delft University of Technology; 2010. Available from: http://resolver.tudelft.nl/uuid:4ab25966-8291-4ad2-bed2-2962262af902


University of Waikato

28. Ye, Chen. Surface Reconstruction by Triangular Mesh of Models with Uneven Density and with Hole .

Degree: 2015, University of Waikato

 With the fast development of computer software, 3D computer aided design (CAD) and computer aided manufacturing (CAM) are being improved rapidly and have been commonly… (more)

Subjects/Keywords: reverse engineering; 3D modelling; triangular mesh

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ye, C. (2015). Surface Reconstruction by Triangular Mesh of Models with Uneven Density and with Hole . (Masters Thesis). University of Waikato. Retrieved from http://hdl.handle.net/10289/10291

Chicago Manual of Style (16th Edition):

Ye, Chen. “Surface Reconstruction by Triangular Mesh of Models with Uneven Density and with Hole .” 2015. Masters Thesis, University of Waikato. Accessed April 25, 2019. http://hdl.handle.net/10289/10291.

MLA Handbook (7th Edition):

Ye, Chen. “Surface Reconstruction by Triangular Mesh of Models with Uneven Density and with Hole .” 2015. Web. 25 Apr 2019.

Vancouver:

Ye C. Surface Reconstruction by Triangular Mesh of Models with Uneven Density and with Hole . [Internet] [Masters thesis]. University of Waikato; 2015. [cited 2019 Apr 25]. Available from: http://hdl.handle.net/10289/10291.

Council of Science Editors:

Ye C. Surface Reconstruction by Triangular Mesh of Models with Uneven Density and with Hole . [Masters Thesis]. University of Waikato; 2015. Available from: http://hdl.handle.net/10289/10291


Penn State University

29. Vidvans, Amey. A modified structure from motion framework based on smartphone imaging for 3D reconstruction of arbitrary shapes.

Degree: 2017, Penn State University

 There is a need for scalable open source 3D reconstruction systems for reverse engineering and in other applications involving additive manufacturing. This is because most… (more)

Subjects/Keywords: Reconstruction; Smartphone; Digital Image Correlation; Reverse Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vidvans, A. (2017). A modified structure from motion framework based on smartphone imaging for 3D reconstruction of arbitrary shapes. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/13939afv5067

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vidvans, Amey. “A modified structure from motion framework based on smartphone imaging for 3D reconstruction of arbitrary shapes.” 2017. Thesis, Penn State University. Accessed April 25, 2019. https://etda.libraries.psu.edu/catalog/13939afv5067.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vidvans, Amey. “A modified structure from motion framework based on smartphone imaging for 3D reconstruction of arbitrary shapes.” 2017. Web. 25 Apr 2019.

Vancouver:

Vidvans A. A modified structure from motion framework based on smartphone imaging for 3D reconstruction of arbitrary shapes. [Internet] [Thesis]. Penn State University; 2017. [cited 2019 Apr 25]. Available from: https://etda.libraries.psu.edu/catalog/13939afv5067.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vidvans A. A modified structure from motion framework based on smartphone imaging for 3D reconstruction of arbitrary shapes. [Thesis]. Penn State University; 2017. Available from: https://etda.libraries.psu.edu/catalog/13939afv5067

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

30. Wang, Shuai. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.

Degree: 2018, Penn State University

 In software security, many techniques and applications depend on binary code reverse engineering, i.e., analyzing and retrofitting executables with the source code unavailable. Despite the… (more)

Subjects/Keywords: reverse engineering; software security; binary code analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, S. (2018). Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/15591szw175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Shuai. “Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.” 2018. Thesis, Penn State University. Accessed April 25, 2019. https://etda.libraries.psu.edu/catalog/15591szw175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Shuai. “Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.” 2018. Web. 25 Apr 2019.

Vancouver:

Wang S. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. [Internet] [Thesis]. Penn State University; 2018. [cited 2019 Apr 25]. Available from: https://etda.libraries.psu.edu/catalog/15591szw175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang S. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/15591szw175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [16]

.