CSU Home
    • Login
    View Item 
    •   Mountain Scholar Home
    • Colorado State University, Fort Collins
    • CSU Theses and Dissertations
    • 2000-2019 - CSU Theses and Dissertations
    • View Item
    •   Mountain Scholar Home
    • Colorado State University, Fort Collins
    • CSU Theses and Dissertations
    • 2000-2019 - CSU Theses and Dissertations
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Automated security analysis of the home computer

    Thumbnail
    Citable Link(s)
    http://hdl.handle.net/10217/82538
    Download/View
    Urbanska_colostate_0053N_12217.pdf (4.941Mb)
    View full record
    Altmetrics
    Abstract
    Home computer users pose special challenges to the security of their machines. Often home computer users do not realize that their computer activities have repercussions on computer security. Frequently, they are not aware about their role in keeping their home computer secure. Therefore, security analysis solutions for a home computer must differ significantly from standard security solutions. In addition to considering the properties of a single system, the characteristics of a home user have to be deliberated. Attack Graphs (AGs) are models that have been widely used for security analysis. A ...
    (For more, see "View full record.")
    Author(s)
    Urbanska, Malgorzata

    Advisor(s)
    Ray, Indrajit; Howe, Adele E.

    Date Issued
    2014
    Format
    born digital; masters theses
    Collections
    • 2000-2019 - CSU Theses and Dissertations
    • Theses and Dissertations - Department of Computer Science

    DSpace software   copyright © 2002-2016   DuraSpace
    Contact Us | Send Feedback
    Registered Repository
    RE3 Certified
    HTML Sitemap  

     

    Browse

    All of Mountain ScholarCommunities & CollectionsDatesAuthorsTitlesSubjectsThis CollectionDatesAuthorsTitlesSubjects

    My Account

    LoginRegister

    Statistics

    View Usage Statistics

    DSpace software   copyright © 2002-2016   DuraSpace
    Contact Us | Send Feedback
    Registered Repository
    RE3 Certified
    HTML Sitemap