Christian W Probst
Christian W Probst
Verified email at unitec.ac.nz
Title
Cited by
Cited by
Year
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011
2092011
HotpathVM: An effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
1872006
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
1212011
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
1212011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
1072010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
682006
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
632010
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
582008
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider Threats in Cyber Security, 1-15, 2010
432010
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
402013
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
392018
08302 Abstracts Collection--Countering Insider Threats
M Bishop, D Gollmann, J Hunker, CW Probst
Dagstuhl Seminar Proceedings, 2008
352008
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
342015
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
3rd International conference ACECS 16, 2016, 2016
332016
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammüller, JRC Nurse, CW Probst
International Conference on Human Aspects of Information Security, Privacy …, 2016
282016
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
282015
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
262006
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SH Van Der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
242012
Combining generated data models with formal invalidation for insider threat analysis
F Kammüller, CW Probst
2014 IEEE Security and Privacy Workshops, 229-235, 2014
232014
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
IFIP International Conference on Information Security Theory and Practice …, 2015
222015
The system can't perform the operation now. Try again later.
Articles 1–20