Items where Author / Artist / Editor is "Probst, Christian"

See full list of headings
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 15.

Kammueller, Florian and Probst, Christian (2017) Modeling and verification of insider threats using logical analysis. IEEE Systems Journal, 11 (2). pp. 534-545. ISSN 1932-8184 (doi:10.1109/JSYST.2015.2453215)

Kammueller, Florian, Kerber, Manfred and Probst, Christian (2017) Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 8 (1). pp. 44-78. ISSN 2093-5374 (doi:10.22667/JOWUA.2017.03.31.044)

Kammueller, Florian, Kerber, Manfred and Probst, Christian (2016) Towards formal analysis of insider threats for auctions. In: ACM-CCS Workshop on Management of Security of Insider Threats, 28 Oct 2016, Vienna, Austria. (doi:10.1145/2995959.2995963)

Chen, Taolue, Han, Tingting, Kammueller, Florian, Nemli, Ibrahim and Probst, Christian (2016) Model based analysis of insider threats. In: 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 13-14 Jun 2016, London, United Kingdom. (doi:10.1109/CyberSecPODS.2016.7502350)

Kammueller, Florian, Nurse, Jason R. C. and Probst, Christian (2016) Attack tree analysis for insider threats on the IoT using Isabelle. In: 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016, 17-24 Jul 2016, Toronto, ON, Canada. (doi:10.1007/978-3-319-39381-0_21)

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, Rene Rydhof and Kammueller, Florian (2016) Transforming graphical system models to graphical attack models. In: 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015, 13 Jul 2015, Verona, Italy. (doi:10.1007/978-3-319-29968-6_6)

Helke, Steffen, Kammueller, Florian and Probst, Christian (2016) Secure refactoring with Java information flow. In: 10th International Workshop on Data Privacy Management (DPM 2015), 21- 22 Sept 2015, Vienna, Austria. (doi:10.1007/978-3-319-29883-2_19)

Probst, Christian, Kammueller, Florian and Hansen, Rene Rydhof (2016) Formal modelling and analysis of socio-technical systems. In: Semantics, Logics, and Calculi. Springer International. .

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, Rene Rydhof and Kammueller, Florian (2015) Attack tree generation by policy invalidation. In: 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 Aug 2015, Heraklion, Crete, Greece. (doi:10.1007/978-3-319-24018-3_16)

Chen, Taolue, Kammueller, Florian, Nemli, Ibrahim and Probst, Christian (2015) A probabilistic analysis framework for malicious insider threats. In: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015, 2-7 Aug 2015, Los Angeles, California, USA.

Kammueller, Florian and Probst, Christian (2014) Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (2). pp. 59-79. ISSN 2093-5374 (doi:10.22667/JOWUA.2014.06.31.059)

Kammueller, Florian and Probst, Christian (2014) Combining generated data models with formal invalidation for insider threat analysis. In: 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014), 17-18 May 2014, San Jose, California, USA. (doi:10.1109/SPW.2014.45)

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, R. R. and Kammueller, Florian (2013) Externalizing behaviour for analysing system models. In: 5th International Workshop on Managing Insider Security Threats, MIST, 2013..

Kammueller, Florian and Probst, Christian (2013) Invalidating policies using structural information. In: IEEE CS Security and Privacy Workshops, SPW, WRIT'13.

Kammueller, Florian, Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.

This list was generated on Sat Dec 7 05:10:27 2019 GMT.