Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques. J Hunker, CW Probst J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011 | 297 | 2011 |
HotpathVM: An effective JIT compiler for resource-constrained devices A Gal, CW Probst, M Franz Proceedings of the 2nd international conference on Virtual execution …, 2006 | 206 | 2006 |
Towards a time-predictable dual-issue microprocessor: The Patmos approach M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ... Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011 | 141 | 2011 |
Towards a time-predictable dual-issue microprocessor: The Patmos approach M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ... Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011 | 141 | 2011 |
Security audits of multi-tier virtual infrastructures in public infrastructure clouds S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010 | 129 | 2010 |
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018 | 92 | 2018 |
Insider threats in cyber security CW Probst, J Hunker, M Bishop, D Gollmann Springer Science & Business Media, 2010 | 85 | 2010 |
Where can an insider attack? CW Probst, RR Hansen, F Nielson Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007 | 75 | 2007 |
An extensible analysable system model CW Probst, RR Hansen Information security technical report 13 (4), 235-246, 2008 | 64 | 2008 |
Aspects of insider threats CW Probst, J Hunker, D Gollmann, M Bishop Insider threats in cyber security, 1-15, 2010 | 55 | 2010 |
Hand gesture recognition using leap motion controller for recognition of arabic sign language B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst 3rd International conference ACECS 16, 233-238, 2016 | 53 | 2016 |
Transforming graphical system models to graphical attack models MG Ivanova, CW Probst, RR Hansen, F Kammüller Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016 | 44 | 2016 |
Invalidating policies using structural information F Kammüller, CW Probst 2013 IEEE Security and Privacy Workshops, 76-81, 2013 | 44 | 2013 |
Modeling and verification of insider threats using logical analysis F Kammüller, CW Probst IEEE systems journal 11 (2), 534-545, 2015 | 39 | 2015 |
Attack tree analysis for insider threats on the IoT using Isabelle F Kammüller, JRC Nurse, CW Probst Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016 | 37 | 2016 |
Countering insider threats M Bishop, D Gollmann, J Hunker, CW Probst Dagstuhl Seminar Proceedings 8302, 1-18, 2008 | 36 | 2008 |
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability W Pieters, SH Van Der Ven, CW Probst Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012 | 33 | 2012 |
Attack tree generation by policy invalidation MG Ivanova, CW Probst, RR Hansen, F Kammüller Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015 | 30 | 2015 |
Sandboxing in myKlaim RR Hansen, CW Probst, F Nielson First International Conference on Availability, Reliability and Security …, 2006 | 29 | 2006 |
Non-interference and erasure policies for java card bytecode RR Hansen, CW Probst 6th International Workshop on Issues in the Theory of Security (WITS’06), 2006 | 28 | 2006 |