Követés
Christian W Probst
Christian W Probst
E-mail megerősítve itt: unitec.ac.nz
Cím
Hivatkozott rá
Hivatkozott rá
Év
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011
3272011
HotpathVM: An effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
2072006
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1412011
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1412011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
1312010
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
1082018
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
952010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
782007
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
612008
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider threats in cyber security, 1-15, 2010
592010
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
3rd International conference ACECS 16, 233-238, 2016
562016
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
462016
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
452015
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
442013
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammüller, JRC Nurse, CW Probst
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
392016
08302 Abstracts Collection--Countering Insider Threats
M Bishop, D Gollmann, J Hunker, CW Probst
Dagstuhl Seminar Proceedings, 2008
382008
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
352015
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SH Van Der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
322012
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
302006
Non-interference and erasure policies for java card bytecode
RR Hansen, CW Probst
6th International Workshop on Issues in the Theory of Security (WITS’06), 2006
282006
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20