Items where Author / Artist / Editor is "Probst, Christian"

See full list of headings
Export as [feed] Atom [feed] RSS 1.0
Group by: Item Type | No Grouping
Number of items: 10.

Article

Kammueller, Florian and Probst, Christian (2016) Modeling and verification of insider threats using logical analysis. IEEE Systems Journal . (Accepted/In Press)

Kammueller, Florian and Probst, Christian (2014) Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (2). pp. 59-79. ISSN SSN: 2093-5374 (printed) ISSN: 2093-5382 (online)

Book Section

Georgieva Ivanova, Marieta and Hansen, Rene Rydhof and Kammueller, Florian and Probst, Christian (2015) Attack tree generation by policy invalidation. In: 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Springer. (Accepted/In Press)

Georgieva Ivanova, Marieta and Probst, Christian and Hansen, Rene Rydhof and Kammueller, Florian (2015) Transforming graphical system models to graphical attack models. In: The Second International Workshop on Graphical Models for Security, GraMSec'15, co-located with CSF2015. LNCS . Springer. (Accepted/In Press)

Conference or Workshop Item

Chen, Taolue and Kammueller, Florian and Nemli, Ibrahim and Probst, Christian (2015) A probabilistic analysis framework for malicious insider threats. In: Human Computer Interaction International.

Kammueller, Florian and Probst, Christian (2014) Combining generated data models with formal invalidation for insider threat analysis. In: EEE Security and Privacy Workshops, SPW, WRIT’14..

Ivanova, Marieta Georgieva and Probst, Christian and Hansen, R. R. and Kammueller, Florian (2013) Externalizing behaviour for analysing system models. In: 5th International Workshop on Managing Insider Security Threats, MIST, 2013..

Kammueller, Florian and Probst, Christian (2013) Invalidating policies using structural information. In: IEEE CS Security and Privacy Workshops, SPW, WRIT'13.

Kammueller, Florian and Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.

Boender, Jaap and Kammueller, Florian and Georgieva Ivanova, Marieta and Probst, Christian Modeling human behaviour with higher order logic: insider threats. In: Socio-Technical Aspects of Security and Trust.

This list was generated on Tue Jul 7 12:06:12 2015 BST.