Items where Author / Artist / Editor is "Probst, Christian"

See full list of headings
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 15.

Article

Kammueller, Florian and Probst, Christian (2017) Modeling and verification of insider threats using logical analysis. IEEE Systems Journal, 11 (2) . pp. 534-545. ISSN 1932-8184 (doi:10.1109/JSYST.2015.2453215)

Kammueller, Florian, Kerber, Manfred and Probst, Christian (2017) Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 8 (1) . pp. 44-78. ISSN 2093-5374 (doi:10.22667/JOWUA.2017.03.31.044)

Kammueller, Florian and Probst, Christian (2014) Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (2) . pp. 59-79. ISSN 2093-5374 (doi:10.22667/JOWUA.2014.06.31.059)

Book Section

Probst, Christian, Kammueller, Florian and Hansen, Rene Rydhof (2016) Formal modelling and analysis of socio-technical systems. In: Semantics, Logics, and Calculi. Springer International. .

Conference or Workshop Item

Kammueller, Florian, Kerber, Manfred and Probst, Christian (2016) Towards formal analysis of insider threats for auctions. Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST '16). In: ACM-CCS Workshop on Management of Security of Insider Threats, 28 Oct 2016, Vienna, Austria. ISBN 9781450345712. (doi:10.1145/2995959.2995963)

Chen, Taolue, Han, Tingting, Kammueller, Florian, Nemli, Ibrahim and Probst, Christian (2016) Model based analysis of insider threats. Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). In: 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 13-14 Jun 2016, London, United Kingdom. ISBN 978-1-5090-0709-7. (doi:10.1109/CyberSecPODS.2016.7502350)

Kammueller, Florian, Nurse, Jason R. C. and Probst, Christian (2016) Attack tree analysis for insider threats on the IoT using Isabelle. Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. In: 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016, 17-24 Jul 2016, Toronto, ON, Canada. ISBN 9783319393803. ISSN 0302-9743 (doi:10.1007/978-3-319-39381-0_21)

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, Rene Rydhof and Kammueller, Florian (2016) Transforming graphical system models to graphical attack models. Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. In: 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015, 13 Jul 2015, Verona, Italy. ISBN 9783319299679. ISSN 0302-9743 (doi:10.1007/978-3-319-29968-6_6)

Helke, Steffen, Kammueller, Florian and Probst, Christian (2016) Secure refactoring with Java information flow. Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers. In: 10th International Workshop on Data Privacy Management (DPM 2015), 21- 22 Sept 2015, Vienna, Austria. ISBN 9783319298832. ISSN 0302-9743 (doi:10.1007/978-3-319-29883-2_19)

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, Rene Rydhof and Kammueller, Florian (2015) Attack tree generation by policy invalidation. Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings. In: 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 Aug 2015, Heraklion, Crete, Greece. ISBN 9783319240176. ISSN 0302-9743 (doi:10.1007/978-3-319-24018-3_16)

Chen, Taolue, Kammueller, Florian, Nemli, Ibrahim and Probst, Christian (2015) A probabilistic analysis framework for malicious insider threats. Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. In: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015, 2-7 Aug 2015, Los Angeles, California, USA. ISBN 9783319203751. ISSN 0302-9743

Kammueller, Florian and Probst, Christian (2014) Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW). In: 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014), 17-18 May 2014, San Jose, California, USA. ISBN 9781479951031. (doi:10.1109/SPW.2014.45)

Ivanova, Marieta Georgieva, Probst, Christian, Hansen, R. R. and Kammueller, Florian (2013) Externalizing behaviour for analysing system models. In: 5th International Workshop on Managing Insider Security Threats, MIST, 2013.. .

Kammueller, Florian and Probst, Christian (2013) Invalidating policies using structural information. In: IEEE CS Security and Privacy Workshops, SPW, WRIT'13. .

Kammueller, Florian, Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy. .

This list was generated on Thu Jan 23 05:11:53 2020 GMT.