Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Colorado State University" +contributor:("Ray, Indrajit"). Showing records 1 – 30 of 31 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Colorado State University

1. Rammer, Daniel P. Monitoring and characterizing application service availability.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Reliable detection of global application service availability remains an open problem on the Internet. Some availability issues are diagnosable by an administrator monitoring the service… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rammer, D. P. (2018). Monitoring and characterizing application service availability. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/189294

Chicago Manual of Style (16th Edition):

Rammer, Daniel P. “Monitoring and characterizing application service availability.” 2018. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/189294.

MLA Handbook (7th Edition):

Rammer, Daniel P. “Monitoring and characterizing application service availability.” 2018. Web. 28 Feb 2021.

Vancouver:

Rammer DP. Monitoring and characterizing application service availability. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/189294.

Council of Science Editors:

Rammer DP. Monitoring and characterizing application service availability. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/189294


Colorado State University

2. Mulamba Kadimbadimba, Dieudonne. On the design of a secure and anonymous publish-subscribe system.

Degree: MS(M.S.), Computer Science, 2012, Colorado State University

 The reliability and the high availability of data have made online servers very popular among single users or organizations like hospitals, insurance companies or administrations.… (more)

Subjects/Keywords: anonymous communication; publish-subscribe; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulamba Kadimbadimba, D. (2012). On the design of a secure and anonymous publish-subscribe system. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/68130

Chicago Manual of Style (16th Edition):

Mulamba Kadimbadimba, Dieudonne. “On the design of a secure and anonymous publish-subscribe system.” 2012. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/68130.

MLA Handbook (7th Edition):

Mulamba Kadimbadimba, Dieudonne. “On the design of a secure and anonymous publish-subscribe system.” 2012. Web. 28 Feb 2021.

Vancouver:

Mulamba Kadimbadimba D. On the design of a secure and anonymous publish-subscribe system. [Internet] [Masters thesis]. Colorado State University; 2012. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/68130.

Council of Science Editors:

Mulamba Kadimbadimba D. On the design of a secure and anonymous publish-subscribe system. [Masters Thesis]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/68130


Colorado State University

3. Urbanska, Malgorzata. Automated security analysis of the home computer.

Degree: MS(M.S.), Computer Science, 2014, Colorado State University

 Home computer users pose special challenges to the security of their machines. Often home computer users do not realize that their computer activities have repercussions… (more)

Subjects/Keywords: attacks and defenses; attack graphs; security personalization; security risk modeling; system security; vulnerability database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Urbanska, M. (2014). Automated security analysis of the home computer. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/82538

Chicago Manual of Style (16th Edition):

Urbanska, Malgorzata. “Automated security analysis of the home computer.” 2014. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/82538.

MLA Handbook (7th Edition):

Urbanska, Malgorzata. “Automated security analysis of the home computer.” 2014. Web. 28 Feb 2021.

Vancouver:

Urbanska M. Automated security analysis of the home computer. [Internet] [Masters thesis]. Colorado State University; 2014. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/82538.

Council of Science Editors:

Urbanska M. Automated security analysis of the home computer. [Masters Thesis]. Colorado State University; 2014. Available from: http://hdl.handle.net/10217/82538


Colorado State University

4. Amarnath, Athith. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Security is a very serious concern in this era of digital world. Protecting and controlling access to secured data and services has given more emphasis… (more)

Subjects/Keywords: Byzantine fault tolerance; random walk; moving target defense; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amarnath, A. (2018). On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/193171

Chicago Manual of Style (16th Edition):

Amarnath, Athith. “On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.” 2018. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/193171.

MLA Handbook (7th Edition):

Amarnath, Athith. “On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.” 2018. Web. 28 Feb 2021.

Vancouver:

Amarnath A. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/193171.

Council of Science Editors:

Amarnath A. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/193171


Colorado State University

5. Mukherjee, Subhojeet. Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A.

Degree: MS(M.S.), Computer Science, 2017, Colorado State University

 Computer users are not safe, be it at home or in public places. Public networks are more often administered by trained individuals who attempt to… (more)

Subjects/Keywords: cyber-security; graph; semantic; grammar; concept; NLP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mukherjee, S. (2017). Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/185622

Chicago Manual of Style (16th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A.” 2017. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/185622.

MLA Handbook (7th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A.” 2017. Web. 28 Feb 2021.

Vancouver:

Mukherjee S. Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A. [Internet] [Masters thesis]. Colorado State University; 2017. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/185622.

Council of Science Editors:

Mukherjee S. Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A. [Masters Thesis]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/185622


Colorado State University

6. Algarni, Abdullah Mahdi. Quantitative economics of security: software vulnerabilities and data breaches.

Degree: PhD, Computer Science, 2016, Colorado State University

 Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Algarni, A. M. (2016). Quantitative economics of security: software vulnerabilities and data breaches. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176634

Chicago Manual of Style (16th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/176634.

MLA Handbook (7th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Web. 28 Feb 2021.

Vancouver:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/176634.

Council of Science Editors:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176634


Colorado State University

7. Xie, Xing. Multilevel secure data stream management system.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of mobile and sensor devices, situation monitoring applications are now feasible. The data processing system should be able to collect large amount… (more)

Subjects/Keywords: distributed MLS; trusted MLS; replicated MLS; multilevel security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, X. (2013). Multilevel secure data stream management system. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80188

Chicago Manual of Style (16th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2013. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/80188.

MLA Handbook (7th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2013. Web. 28 Feb 2021.

Vancouver:

Xie X. Multilevel secure data stream management system. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/80188.

Council of Science Editors:

Xie X. Multilevel secure data stream management system. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/80188


Colorado State University

8. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2013). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Web. 28 Feb 2021.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/78814


Colorado State University

9. Springer, William M., II. Dynamic representation of consecutive-ones matrices and interval graphs.

Degree: PhD, Computer Science, 2015, Colorado State University

 We give an algorithm for updating a consecutive-ones ordering of a consecutive-ones matrix when a row or column is added or deleted. When the addition… (more)

Subjects/Keywords: certifying algorithm; interval graph; Tucker matrix; consecutive-ones matrix; asteroidal triple; Lekkerkerker-Boland

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Springer, William M., I. (2015). Dynamic representation of consecutive-ones matrices and interval graphs. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/166918

Chicago Manual of Style (16th Edition):

Springer, William M., II. “Dynamic representation of consecutive-ones matrices and interval graphs.” 2015. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/166918.

MLA Handbook (7th Edition):

Springer, William M., II. “Dynamic representation of consecutive-ones matrices and interval graphs.” 2015. Web. 28 Feb 2021.

Vancouver:

Springer, William M. I. Dynamic representation of consecutive-ones matrices and interval graphs. [Internet] [Doctoral dissertation]. Colorado State University; 2015. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/166918.

Council of Science Editors:

Springer, William M. I. Dynamic representation of consecutive-ones matrices and interval graphs. [Doctoral Dissertation]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/166918


Colorado State University

10. Basnet, Rejina. Integration of task-attribute based access control model for mobile workflow authorization and management.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 Workflow is the automation of process logistics for managing simple every day to complex multi-user tasks. By defining a workflow with proper constraints, an organization… (more)

Subjects/Keywords: attribute based access control; TCPN analysis; workflow security; policy machine; access control; workflow management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basnet, R. (2019). Integration of task-attribute based access control model for mobile workflow authorization and management. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195323

Chicago Manual of Style (16th Edition):

Basnet, Rejina. “Integration of task-attribute based access control model for mobile workflow authorization and management.” 2019. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/195323.

MLA Handbook (7th Edition):

Basnet, Rejina. “Integration of task-attribute based access control model for mobile workflow authorization and management.” 2019. Web. 28 Feb 2021.

Vancouver:

Basnet R. Integration of task-attribute based access control model for mobile workflow authorization and management. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/195323.

Council of Science Editors:

Basnet R. Integration of task-attribute based access control model for mobile workflow authorization and management. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195323


Colorado State University

11. Kar, Diptendu Mohan. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 DNA synthesis has become increasingly common, and many synthetic DNA molecules are licensed intellectual property (IP). DNA samples are shared between academic labs, ordered from… (more)

Subjects/Keywords: identity based signatures; elliptic curve cryptography; cyber-bio security; pairing-based cryptography; DNA; Reed-Solomon codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kar, D. M. (2019). Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195249

Chicago Manual of Style (16th Edition):

Kar, Diptendu Mohan. “Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.” 2019. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/195249.

MLA Handbook (7th Edition):

Kar, Diptendu Mohan. “Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.” 2019. Web. 28 Feb 2021.

Vancouver:

Kar DM. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/195249.

Council of Science Editors:

Kar DM. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195249


Colorado State University

12. Mussa, Awad A. Younis. Quantifying the security risk of discovering and exploiting software vulnerabilities.

Degree: PhD, Computer Science, 2016, Colorado State University

 Most of the attacks on computer systems and networks are enabled by vulnerabilities in a software. Assessing the security risk associated with those vulnerabilities is… (more)

Subjects/Keywords: software security; vulnerabilities exploitation; vulnerability rewards program and time to vulnerability disclosure; software vulnerabilities; cvss and OWASP metrics; vulnerabilities risk and severity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mussa, A. A. Y. (2016). Quantifying the security risk of discovering and exploiting software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176641

Chicago Manual of Style (16th Edition):

Mussa, Awad A Younis. “Quantifying the security risk of discovering and exploiting software vulnerabilities.” 2016. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/176641.

MLA Handbook (7th Edition):

Mussa, Awad A Younis. “Quantifying the security risk of discovering and exploiting software vulnerabilities.” 2016. Web. 28 Feb 2021.

Vancouver:

Mussa AAY. Quantifying the security risk of discovering and exploiting software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/176641.

Council of Science Editors:

Mussa AAY. Quantifying the security risk of discovering and exploiting software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176641


Colorado State University

13. Joh, HyunChul. Quantitative analyses of software vulnerabilities.

Degree: PhD, Computer Science, 2011, Colorado State University

 There have been numerous studies addressing computer security and software vulnerability management. Most of the time, they have taken a qualitative perspective. In many other… (more)

Subjects/Keywords: modeling; quantitative analysis; risk; security; software; vulnerability discovery process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joh, H. (2011). Quantitative analyses of software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/70444

Chicago Manual of Style (16th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/70444.

MLA Handbook (7th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Web. 28 Feb 2021.

Vancouver:

Joh H. Quantitative analyses of software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2011. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/70444.

Council of Science Editors:

Joh H. Quantitative analyses of software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/70444


Colorado State University

14. Strizhov, Mikhail. Towards a secure and efficient search over encrypted cloud data.

Degree: PhD, Computer Science, 2016, Colorado State University

 Cloud computing enables new types of services where the computational and network resources are available online through the Internet. One of the most popular services… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Strizhov, M. (2016). Towards a secure and efficient search over encrypted cloud data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176763

Chicago Manual of Style (16th Edition):

Strizhov, Mikhail. “Towards a secure and efficient search over encrypted cloud data.” 2016. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/176763.

MLA Handbook (7th Edition):

Strizhov, Mikhail. “Towards a secure and efficient search over encrypted cloud data.” 2016. Web. 28 Feb 2021.

Vancouver:

Strizhov M. Towards a secure and efficient search over encrypted cloud data. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/176763.

Council of Science Editors:

Strizhov M. Towards a secure and efficient search over encrypted cloud data. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176763

15. Hung, Benjamin W. K. Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A.

Degree: PhD, Systems Engineering, 2017, Colorado State University

 The number and lethality of violent extremist plots motivated by the Salafi-jihadist ideology have been growing for nearly the last decade in both the U.S… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hung, B. W. K. (2017). Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/183979

Chicago Manual of Style (16th Edition):

Hung, Benjamin W K. “Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A.” 2017. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/183979.

MLA Handbook (7th Edition):

Hung, Benjamin W K. “Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A.” 2017. Web. 28 Feb 2021.

Vancouver:

Hung BWK. Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/183979.

Council of Science Editors:

Hung BWK. Graph-based, systems approach for detecting violent extremist radicalization trajectories and other latent behaviors, A. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/183979


Colorado State University

16. Tan, Haiming. Machine learning-based fusion studies of rainfall estimation from spaceborne and ground-based radars.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 Precipitation measurement by satellite radar plays a significant role in researching the water circle and forecasting extreme weather event. Tropical Rainfall Measuring Mission (TRMM) Precipitation… (more)

Subjects/Keywords: rainfall estimation; machine learning; spaceborne radar

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, H. (2019). Machine learning-based fusion studies of rainfall estimation from spaceborne and ground-based radars. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195325

Chicago Manual of Style (16th Edition):

Tan, Haiming. “Machine learning-based fusion studies of rainfall estimation from spaceborne and ground-based radars.” 2019. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/195325.

MLA Handbook (7th Edition):

Tan, Haiming. “Machine learning-based fusion studies of rainfall estimation from spaceborne and ground-based radars.” 2019. Web. 28 Feb 2021.

Vancouver:

Tan H. Machine learning-based fusion studies of rainfall estimation from spaceborne and ground-based radars. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/195325.

Council of Science Editors:

Tan H. Machine learning-based fusion studies of rainfall estimation from spaceborne and ground-based radars. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195325


Colorado State University

17. Al Lail, Mustafa. Unified modeling language framework for specifying and analyzing temporal properties, A.

Degree: PhD, Computer Science, 2018, Colorado State University

 In the context of Model-Driven Engineering (MDE), designers use the Unified Modeling Language (UML) to create models that drive the entire development process. Once UML… (more)

Subjects/Keywords: properties; temporal; verification; specification; model checking; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Lail, M. (2018). Unified modeling language framework for specifying and analyzing temporal properties, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191492

Chicago Manual of Style (16th Edition):

Al Lail, Mustafa. “Unified modeling language framework for specifying and analyzing temporal properties, A.” 2018. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/191492.

MLA Handbook (7th Edition):

Al Lail, Mustafa. “Unified modeling language framework for specifying and analyzing temporal properties, A.” 2018. Web. 28 Feb 2021.

Vancouver:

Al Lail M. Unified modeling language framework for specifying and analyzing temporal properties, A. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/191492.

Council of Science Editors:

Al Lail M. Unified modeling language framework for specifying and analyzing temporal properties, A. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191492


Colorado State University

18. Haefner, Kyle. Behavioral complexity analysis of networked systems to identify malware attacks.

Degree: PhD, Computer Science, 2020, Colorado State University

 Internet of Things (IoT) environments are often composed of a diverse set of devices that span a broad range of functionality, making them a challenge… (more)

Subjects/Keywords: cyber-security; anomaly-detection; IoT

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haefner, K. (2020). Behavioral complexity analysis of networked systems to identify malware attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/219593

Chicago Manual of Style (16th Edition):

Haefner, Kyle. “Behavioral complexity analysis of networked systems to identify malware attacks.” 2020. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/219593.

MLA Handbook (7th Edition):

Haefner, Kyle. “Behavioral complexity analysis of networked systems to identify malware attacks.” 2020. Web. 28 Feb 2021.

Vancouver:

Haefner K. Behavioral complexity analysis of networked systems to identify malware attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2020. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/219593.

Council of Science Editors:

Haefner K. Behavioral complexity analysis of networked systems to identify malware attacks. [Doctoral Dissertation]. Colorado State University; 2020. Available from: http://hdl.handle.net/10217/219593

19. Mulamba Kadimbadimba, Dieudonné. On designing large, secure and resilient networked systems.

Degree: PhD, Computer Science, 2019, Colorado State University

 Defending large networked systems against rapidly evolving cyber attacks is challenging. This is because of several factors. First, cyber defenders are always fighting an asymmetric… (more)

Subjects/Keywords: moving target defense; secure networks; Sybil detection; online social network; complex networks; social network analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulamba Kadimbadimba, D. (2019). On designing large, secure and resilient networked systems. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197321

Chicago Manual of Style (16th Edition):

Mulamba Kadimbadimba, Dieudonné. “On designing large, secure and resilient networked systems.” 2019. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/197321.

MLA Handbook (7th Edition):

Mulamba Kadimbadimba, Dieudonné. “On designing large, secure and resilient networked systems.” 2019. Web. 28 Feb 2021.

Vancouver:

Mulamba Kadimbadimba D. On designing large, secure and resilient networked systems. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/197321.

Council of Science Editors:

Mulamba Kadimbadimba D. On designing large, secure and resilient networked systems. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197321

20. Belyaev, Kirill. On component-oriented access control in lightweight virtualized server environments.

Degree: PhD, Computer Science, 2017, Colorado State University

 With the advancements in contemporary multi-core CPU architectures and increase in main memory capacity, it is now possible for a server operating system (OS), such… (more)

Subjects/Keywords: data and application security; security architectures; tuple spaces; denial of service protection; access control; service and systems design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belyaev, K. (2017). On component-oriented access control in lightweight virtualized server environments. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/185748

Chicago Manual of Style (16th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2017. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/185748.

MLA Handbook (7th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2017. Web. 28 Feb 2021.

Vancouver:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/185748.

Council of Science Editors:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/185748

21. Ramasamy, Sridhar. Capture and reconstruction of the topology of undirected graphs from partial coordinates: a matrix completion based approach.

Degree: MS(M.S.), Electrical and Computer Engineering, 2017, Colorado State University

 With the advancement in science and technology, new types of complex networks have become common place across varied domains such as computer networks, Internet, bio-technological… (more)

Subjects/Keywords: social networks; undirected graphs; matrix completion; wireless sensor networks; topology reconstruction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramasamy, S. (2017). Capture and reconstruction of the topology of undirected graphs from partial coordinates: a matrix completion based approach. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/181339

Chicago Manual of Style (16th Edition):

Ramasamy, Sridhar. “Capture and reconstruction of the topology of undirected graphs from partial coordinates: a matrix completion based approach.” 2017. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/181339.

MLA Handbook (7th Edition):

Ramasamy, Sridhar. “Capture and reconstruction of the topology of undirected graphs from partial coordinates: a matrix completion based approach.” 2017. Web. 28 Feb 2021.

Vancouver:

Ramasamy S. Capture and reconstruction of the topology of undirected graphs from partial coordinates: a matrix completion based approach. [Internet] [Masters thesis]. Colorado State University; 2017. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/181339.

Council of Science Editors:

Ramasamy S. Capture and reconstruction of the topology of undirected graphs from partial coordinates: a matrix completion based approach. [Masters Thesis]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181339

22. Lazrig, Ibrahim Meftah. Privacy preserving linkage and sharing of sensitive data.

Degree: PhD, Computer Science, 2018, Colorado State University

 Sensitive data, such as personal and business information, is collected by many service providers nowadays. This data is considered as a rich source of information… (more)

Subjects/Keywords: record-linkage; privacy; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lazrig, I. M. (2018). Privacy preserving linkage and sharing of sensitive data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191341

Chicago Manual of Style (16th Edition):

Lazrig, Ibrahim Meftah. “Privacy preserving linkage and sharing of sensitive data.” 2018. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/191341.

MLA Handbook (7th Edition):

Lazrig, Ibrahim Meftah. “Privacy preserving linkage and sharing of sensitive data.” 2018. Web. 28 Feb 2021.

Vancouver:

Lazrig IM. Privacy preserving linkage and sharing of sensitive data. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/191341.

Council of Science Editors:

Lazrig IM. Privacy preserving linkage and sharing of sensitive data. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191341

23. Moataz, Tarik. Searching over encrypted data.

Degree: PhD, Computer Science, 2017, Colorado State University

 Cloud services offer reduced costs, elasticity and a promised unlimited managed storage space that attract many end-users. File sharing, collaborative platforms, email platforms, back-up servers… (more)

Subjects/Keywords: oblivious RAM; structured encryption; searchable encryption; applied cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moataz, T. (2017). Searching over encrypted data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181313

Chicago Manual of Style (16th Edition):

Moataz, Tarik. “Searching over encrypted data.” 2017. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/181313.

MLA Handbook (7th Edition):

Moataz, Tarik. “Searching over encrypted data.” 2017. Web. 28 Feb 2021.

Vancouver:

Moataz T. Searching over encrypted data. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/181313.

Council of Science Editors:

Moataz T. Searching over encrypted data. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181313


Colorado State University

24. Whyman, Paul Arthur. Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database.

Degree: MS(M.S.), Computer Science, 2008, Colorado State University

 A means to reduce security risks to a network of computers is to manage which computers can participate on a network, and control the participation… (more)

Subjects/Keywords: Open source software; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Whyman, P. A. (2008). Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/80811

Chicago Manual of Style (16th Edition):

Whyman, Paul Arthur. “Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database.” 2008. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/80811.

MLA Handbook (7th Edition):

Whyman, Paul Arthur. “Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database.” 2008. Web. 28 Feb 2021.

Vancouver:

Whyman PA. Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database. [Internet] [Masters thesis]. Colorado State University; 2008. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/80811.

Council of Science Editors:

Whyman PA. Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database. [Masters Thesis]. Colorado State University; 2008. Available from: http://hdl.handle.net/10217/80811


Colorado State University

25. Roberts, Mark. Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A.

Degree: PhD, Computer Science, 2013, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Howe, Adele (advisor), Ray, Indrajit (advisor), Whitley, Darrell (committee member), Turk, Daniel (committee member).

Subjects/Keywords: artificial intelligence; classical planning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roberts, M. (2013). Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80970

Chicago Manual of Style (16th Edition):

Roberts, Mark. “Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A.” 2013. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/80970.

MLA Handbook (7th Edition):

Roberts, Mark. “Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A.” 2013. Web. 28 Feb 2021.

Vancouver:

Roberts M. Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/80970.

Council of Science Editors:

Roberts M. Tale of 'T' metrics: choosing tradeoffs in multiobjective planning, A. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/80970


Colorado State University

26. Zaliva, Vadim. Applying static code analysis to firewall policies for the purpose of anomaly detection.

Degree: MS(M.S.), Computer Science, 2009, Colorado State University

 Treating modern firewall policy languages as imperative, special purpose programming languages, in this thesis we will try to apply static code analysis techniques for the… (more)

Subjects/Keywords: datalog language; firewall policy language; anomaly detection algorithms; static code analysis; Firewalls (Computer security)  – Programming; Anomaly detection (Computer security)  – Programming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaliva, V. (2009). Applying static code analysis to firewall policies for the purpose of anomaly detection. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/28638

Chicago Manual of Style (16th Edition):

Zaliva, Vadim. “Applying static code analysis to firewall policies for the purpose of anomaly detection.” 2009. Masters Thesis, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/28638.

MLA Handbook (7th Edition):

Zaliva, Vadim. “Applying static code analysis to firewall policies for the purpose of anomaly detection.” 2009. Web. 28 Feb 2021.

Vancouver:

Zaliva V. Applying static code analysis to firewall policies for the purpose of anomaly detection. [Internet] [Masters thesis]. Colorado State University; 2009. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/28638.

Council of Science Editors:

Zaliva V. Applying static code analysis to firewall policies for the purpose of anomaly detection. [Masters Thesis]. Colorado State University; 2009. Available from: http://hdl.handle.net/10217/28638


Colorado State University

27. Bandara, H. M. N. Dilum. Enhancing collaborative peer-to-peer systems using resource aggregation and caching: a multi-attribute resource and query aware approach.

Degree: PhD, Electrical and Computer Engineering, 2012, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Jayasumana, Anura P. (advisor), Chandrasekar, V. (committee member), Massey, Daniel F. (committee member), Ray, Indrajit (committee member).

Subjects/Keywords: caching; data fusion; named data networking; peer-to-peer; resource discovery; sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bandara, H. M. N. D. (2012). Enhancing collaborative peer-to-peer systems using resource aggregation and caching: a multi-attribute resource and query aware approach. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78733

Chicago Manual of Style (16th Edition):

Bandara, H M N Dilum. “Enhancing collaborative peer-to-peer systems using resource aggregation and caching: a multi-attribute resource and query aware approach.” 2012. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/78733.

MLA Handbook (7th Edition):

Bandara, H M N Dilum. “Enhancing collaborative peer-to-peer systems using resource aggregation and caching: a multi-attribute resource and query aware approach.” 2012. Web. 28 Feb 2021.

Vancouver:

Bandara HMND. Enhancing collaborative peer-to-peer systems using resource aggregation and caching: a multi-attribute resource and query aware approach. [Internet] [Doctoral dissertation]. Colorado State University; 2012. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/78733.

Council of Science Editors:

Bandara HMND. Enhancing collaborative peer-to-peer systems using resource aggregation and caching: a multi-attribute resource and query aware approach. [Doctoral Dissertation]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/78733


Colorado State University

28. Toahchoodee, Manachai. Access control models for pervasive computing environments.

Degree: PhD, Computer Science, 2010, Colorado State University

 With the growing advancement of pervasive computing technologies, we are moving towards an era where context information will be necessary for access control. Traditional access… (more)

Subjects/Keywords: data security; RBAC; pervasive computing; computer security; access control model for pervasive computing; access control model; Ubiquitous computing; Context-aware computing; Computers  – Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Toahchoodee, M. (2010). Access control models for pervasive computing environments. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/39107

Chicago Manual of Style (16th Edition):

Toahchoodee, Manachai. “Access control models for pervasive computing environments.” 2010. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/39107.

MLA Handbook (7th Edition):

Toahchoodee, Manachai. “Access control models for pervasive computing environments.” 2010. Web. 28 Feb 2021.

Vancouver:

Toahchoodee M. Access control models for pervasive computing environments. [Internet] [Doctoral dissertation]. Colorado State University; 2010. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/39107.

Council of Science Editors:

Toahchoodee M. Access control models for pervasive computing environments. [Doctoral Dissertation]. Colorado State University; 2010. Available from: http://hdl.handle.net/10217/39107


Colorado State University

29. Dewri, Rinku. Multi-criteria analysis in modern information management.

Degree: PhD, Computer Science, 2010, Colorado State University

 The past few years have witnessed an overwhelming amount of research in the field of information security and privacy. An encouraging outcome of this research… (more)

Subjects/Keywords: Information management; data broadcasting; multi-objective optimization; information security and privacy; Computer networks  – Security measures; Computer security; Multiple criteria decision making

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dewri, R. (2010). Multi-criteria analysis in modern information management. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/40284

Chicago Manual of Style (16th Edition):

Dewri, Rinku. “Multi-criteria analysis in modern information management.” 2010. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/40284.

MLA Handbook (7th Edition):

Dewri, Rinku. “Multi-criteria analysis in modern information management.” 2010. Web. 28 Feb 2021.

Vancouver:

Dewri R. Multi-criteria analysis in modern information management. [Internet] [Doctoral dissertation]. Colorado State University; 2010. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/40284.

Council of Science Editors:

Dewri R. Multi-criteria analysis in modern information management. [Doctoral Dissertation]. Colorado State University; 2010. Available from: http://hdl.handle.net/10217/40284


Colorado State University

30. Poolsappasit, Nayot. Towards an efficient vulnerability analysis methodology for better security risk management.

Degree: PhD, Computer Science, 2010, Colorado State University

 Risk management is a process that allows IT managers to balance between cost of the protective measures and gains in mission capability. A system administrator… (more)

Subjects/Keywords: data security; security best practice; security; risk management; multi-objective optimization; Computer security  – Management; Cyberterrorism; Information technology  – Risk management; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Poolsappasit, N. (2010). Towards an efficient vulnerability analysis methodology for better security risk management. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/40477

Chicago Manual of Style (16th Edition):

Poolsappasit, Nayot. “Towards an efficient vulnerability analysis methodology for better security risk management.” 2010. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/40477.

MLA Handbook (7th Edition):

Poolsappasit, Nayot. “Towards an efficient vulnerability analysis methodology for better security risk management.” 2010. Web. 28 Feb 2021.

Vancouver:

Poolsappasit N. Towards an efficient vulnerability analysis methodology for better security risk management. [Internet] [Doctoral dissertation]. Colorado State University; 2010. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/40477.

Council of Science Editors:

Poolsappasit N. Towards an efficient vulnerability analysis methodology for better security risk management. [Doctoral Dissertation]. Colorado State University; 2010. Available from: http://hdl.handle.net/10217/40477

[1] [2]

.