Items where Author / Artist / Editor is "Probst, Christian"

See full list of headings
Export as [feed] Atom [feed] RSS 1.0
Group by: Item Type | No Grouping
Number of items: 15.

Kammueller, Florian and Kerber, Manfred and Probst, Christian (2017) Insider threats for auctions: formal modeling, proof, and certified code. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 8 (1). pp. 44-78. ISSN 2093-5374

Kammueller, Florian and Kerber, Manfred and Probst, Christian (2016) Towards formal analysis of insider threats for auctions. In: ACM-CCS Workshop on Management of Security of Insider Threats, 28 Oct 2016, Vienna, Austria.

Chen, Taolue and Han, Tingting and Kammueller, Florian and Nemli, Ibrahim and Probst, Christian (2016) Model based analysis of insider threats. In: 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 13-14 Jun 2016, London, United Kingdom.

Helke, Steffen and Kammueller, Florian and Probst, Christian (2016) Secure refactoring with Java information flow. In: 10th International Workshop on Data Privacy Management (DPM 2015), 21- 22 Sept 2015, Vienna, Austria.

Probst, Christian and Kammueller, Florian and Hansen, Rene Rydhof (2016) Formal modelling and analysis of socio-technical systems. In: Semantics, Logics, and Calculi. Springer International.

Kammueller, Florian and Nurse, Jason R. C. and Probst, Christian (2016) Attack tree analysis for insider threats on the IoT using Isabelle. In: 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016, 17-24 Jul 2016, Toronto, ON, Canada. (Accepted/In press)

Kammueller, Florian and Probst, Christian (2016) Modeling and verification of insider threats using logical analysis. IEEE Systems Journal . ISSN 1932-8184 (Accepted/In press)

Chen, Taolue and Kammueller, Florian and Nemli, Ibrahim and Probst, Christian (2015) A probabilistic analysis framework for malicious insider threats. In: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015, 2-7 Aug 2015, Los Angeles, California, USA.

Georgieva Ivanova, Marieta and Hansen, Rene Rydhof and Kammueller, Florian and Probst, Christian (2015) Attack tree generation by policy invalidation. In: 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Springer. (Accepted/In press)

Georgieva Ivanova, Marieta and Probst, Christian and Hansen, Rene Rydhof and Kammueller, Florian (2015) Transforming graphical system models to graphical attack models. In: The Second International Workshop on Graphical Models for Security, GraMSec'15, co-located with CSF2015. LNCS . Springer. (Accepted/In press)

Kammueller, Florian and Probst, Christian (2014) Combining generated data models with formal invalidation for insider threat analysis. In: 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014), 17-18 May 2014, San Jose, California, USA.

Kammueller, Florian and Probst, Christian (2014) Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (2). pp. 59-79. ISSN SSN: 2093-5374 (printed) ISSN: 2093-5382 (online)

Ivanova, Marieta Georgieva and Probst, Christian and Hansen, R. R. and Kammueller, Florian (2013) Externalizing behaviour for analysing system models. In: 5th International Workshop on Managing Insider Security Threats, MIST, 2013..

Kammueller, Florian and Probst, Christian (2013) Invalidating policies using structural information. In: IEEE CS Security and Privacy Workshops, SPW, WRIT'13.

Kammueller, Florian and Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.

This list was generated on Wed Nov 22 04:38:44 2017 GMT.