Volgen
Christian W Probst
Christian W Probst
Geverifieerd e-mailadres voor unitec.ac.nz
Titel
Geciteerd door
Geciteerd door
Jaar
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011
3532011
HotpathVM: An effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
2092006
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1422011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
1322010
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
1172018
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
1002010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
802007
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
612008
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider threats in cyber security, 1-15, 2010
602010
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
3rd International conference ACECS 16, 233-238, 2016
582016
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
482015
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
462016
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
422013
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammüller, JRC Nurse, CW Probst
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
402016
08302 abstracts collection–countering insider threats
M Bishop, D Gollmann, J Hunker, CW Probst
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2008
372008
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
342015
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SH Van Der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
332012
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
302006
On the meaning and purpose of attack trees
H Mantel, CW Probst
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 184-18415, 2019
292019
Combining generated data models with formal invalidation for insider threat analysis
F Kammüller, CW Probst
2014 IEEE Security and Privacy Workshops, 229-235, 2014
282014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20