Items where Author / Artist / Editor is "Probst, Christian"
![]() | See full list of headings |
Article
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488 and Probst, Christian
(2017)
Modeling and verification of insider threats using logical analysis.
IEEE Systems Journal, 11
(2)
.
pp. 534-545.
ISSN 1932-8184
[Article]
(doi:10.1109/JSYST.2015.2453215)
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488, Kerber, Manfred and Probst, Christian
(2017)
Insider threats for auctions: formalization, mechanized proof, and code generation.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 8
(1)
.
pp. 44-78.
ISSN 2093-5374
[Article]
(doi:10.22667/JOWUA.2017.03.31.044)
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488 and Probst, Christian
(2014)
Invalidating policies using structural information.
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5
(2)
.
pp. 59-79.
ISSN 2093-5374
[Article]
(doi:10.22667/JOWUA.2014.06.31.059)
Book Section
Probst, Christian, Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488 and Hansen, Rene Rydhof
(2016)
Formal modelling and analysis of socio-technical systems.
In:
Semantics, Logics, and Calculi.
Springer International.
.
[Book Section]
Conference or Workshop Item
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488, Kerber, Manfred and Probst, Christian
(2016)
Towards formal analysis of insider threats for auctions.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST '16).
In: ACM-CCS Workshop on Management of Security of Insider Threats, 28 Oct 2016, Vienna, Austria.
ISBN 9781450345712.
[Conference or Workshop Item]
(doi:10.1145/2995959.2995963)
Chen, Taolue, Han, Tingting, Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488, Nemli, Ibrahim and Probst, Christian
(2016)
Model based analysis of insider threats.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).
In: 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 13-14 Jun 2016, London, United Kingdom.
ISBN 978-1-5090-0709-7.
[Conference or Workshop Item]
(doi:10.1109/CyberSecPODS.2016.7502350)
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488, Nurse, Jason R. C. and Probst, Christian
(2016)
Attack tree analysis for insider threats on the IoT using Isabelle.
Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings.
In: 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016, 17-24 Jul 2016, Toronto, ON, Canada.
ISBN 9783319393803.
ISSN 0302-9743
[Conference or Workshop Item]
(doi:10.1007/978-3-319-39381-0_21)
Ivanova, Marieta Georgieva, Probst, Christian, Hansen, Rene Rydhof and Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488
(2016)
Transforming graphical system models to graphical attack models.
Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers.
In: 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015, 13 Jul 2015, Verona, Italy.
ISBN 9783319299679.
ISSN 0302-9743
[Conference or Workshop Item]
(doi:10.1007/978-3-319-29968-6_6)
Helke, Steffen, Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488 and Probst, Christian
(2016)
Secure refactoring with Java information flow.
Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers.
In: 10th International Workshop on Data Privacy Management (DPM 2015), 21- 22 Sept 2015, Vienna, Austria.
ISBN 9783319298832.
ISSN 0302-9743
[Conference or Workshop Item]
(doi:10.1007/978-3-319-29883-2_19)
Ivanova, Marieta Georgieva, Probst, Christian, Hansen, Rene Rydhof and Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488
(2015)
Attack tree generation by policy invalidation.
Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings.
In: 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 Aug 2015, Heraklion, Crete, Greece.
ISBN 9783319240176.
ISSN 0302-9743
[Conference or Workshop Item]
(doi:10.1007/978-3-319-24018-3_16)
Chen, Taolue, Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488, Nemli, Ibrahim and Probst, Christian
(2015)
A probabilistic analysis framework for malicious insider threats.
Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings.
In: 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015, 2-7 Aug 2015, Los Angeles, California, USA.
ISBN 9783319203751.
ISSN 0302-9743
[Conference or Workshop Item]
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488 and Probst, Christian
(2014)
Combining generated data models with formal invalidation for insider threat analysis.
2014 IEEE Security and Privacy Workshops (SPW).
In: 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014), 17-18 May 2014, San Jose, California, USA.
ISBN 9781479951031.
[Conference or Workshop Item]
(doi:10.1109/SPW.2014.45)
Ivanova, Marieta Georgieva, Probst, Christian, Hansen, R. R. and Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488
(2013)
Externalizing behaviour for analysing system models.
In: 5th International Workshop on Managing Insider Security Threats, MIST, 2013..
.
[Conference or Workshop Item]
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488 and Probst, Christian
(2013)
Invalidating policies using structural information.
In: IEEE CS Security and Privacy Workshops, SPW, WRIT'13.
.
[Conference or Workshop Item]
Kammueller, Florian ORCID: https://orcid.org/0000-0001-5839-5488, Probst, Christian and Raimondi, Franco
ORCID: https://orcid.org/0000-0002-9508-7713
(2012)
Application of verification techniques to security: model checking insider attacks.
In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.
.
[Conference or Workshop Item]