Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques. J Hunker, CW Probst J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011 | 353 | 2011 |
HotpathVM: An effective JIT compiler for resource-constrained devices A Gal, CW Probst, M Franz Proceedings of the 2nd international conference on Virtual execution …, 2006 | 209 | 2006 |
Towards a time-predictable dual-issue microprocessor: The Patmos approach M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011 | 142 | 2011 |
Security audits of multi-tier virtual infrastructures in public infrastructure clouds S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010 | 132 | 2010 |
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018 | 117 | 2018 |
Insider threats in cyber security CW Probst, J Hunker, M Bishop, D Gollmann Springer Science & Business Media, 2010 | 100 | 2010 |
Where can an insider attack? CW Probst, RR Hansen, F Nielson Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007 | 80 | 2007 |
An extensible analysable system model CW Probst, RR Hansen Information security technical report 13 (4), 235-246, 2008 | 61 | 2008 |
Aspects of insider threats CW Probst, J Hunker, D Gollmann, M Bishop Insider threats in cyber security, 1-15, 2010 | 60 | 2010 |
Hand gesture recognition using leap motion controller for recognition of arabic sign language B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst 3rd International conference ACECS 16, 233-238, 2016 | 58 | 2016 |
Modeling and verification of insider threats using logical analysis F Kammüller, CW Probst IEEE systems journal 11 (2), 534-545, 2015 | 48 | 2015 |
Transforming graphical system models to graphical attack models MG Ivanova, CW Probst, RR Hansen, F Kammüller Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016 | 46 | 2016 |
Invalidating policies using structural information F Kammüller, CW Probst 2013 IEEE Security and Privacy Workshops, 76-81, 2013 | 42 | 2013 |
Attack tree analysis for insider threats on the IoT using Isabelle F Kammüller, JRC Nurse, CW Probst Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016 | 40 | 2016 |
08302 abstracts collection–countering insider threats M Bishop, D Gollmann, J Hunker, CW Probst Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2008 | 37 | 2008 |
Attack tree generation by policy invalidation MG Ivanova, CW Probst, RR Hansen, F Kammüller Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015 | 34 | 2015 |
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability W Pieters, SH Van Der Ven, CW Probst Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012 | 33 | 2012 |
Sandboxing in myKlaim RR Hansen, CW Probst, F Nielson First International Conference on Availability, Reliability and Security …, 2006 | 30 | 2006 |
On the meaning and purpose of attack trees H Mantel, CW Probst 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 184-18415, 2019 | 29 | 2019 |
Combining generated data models with formal invalidation for insider threat analysis F Kammüller, CW Probst 2014 IEEE Security and Privacy Workshops, 229-235, 2014 | 28 | 2014 |