Folgen
Christian W Probst
Christian W Probst
Bestätigte E-Mail-Adresse bei unitec.ac.nz
Titel
Zitiert von
Zitiert von
Jahr
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011
2972011
HotpathVM: An effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
2062006
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1412011
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1412011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
1292010
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
922018
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
852010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
752007
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
642008
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider threats in cyber security, 1-15, 2010
552010
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
3rd International conference ACECS 16, 233-238, 2016
532016
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
442016
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
442013
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
392015
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammüller, JRC Nurse, CW Probst
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
372016
Countering insider threats
M Bishop, D Gollmann, J Hunker, CW Probst
Dagstuhl Seminar Proceedings 8302, 1-18, 2008
362008
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SH Van Der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
332012
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
302015
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
292006
Non-interference and erasure policies for java card bytecode
RR Hansen, CW Probst
6th International Workshop on Issues in the Theory of Security (WITS’06), 2006
282006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20