Follow
Christian W Probst
Christian W Probst
Verified email at unitec.ac.nz
Title
Cited by
Cited by
Year
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011
2712011
HotpathVM: An effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
1962006
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1312011
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1312011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
1202010
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
792018
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
782010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
702006
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
632008
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
3rd International conference ACECS 16, 233-238, 2016
482016
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
442013
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider threats in Cyber security, 1-15, 2010
432010
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
382015
08302 Abstracts Collection--Countering Insider Threats
M Bishop, D Gollmann, J Hunker, CW Probst
Dagstuhl Seminar Proceedings, 2008
372008
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
362015
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammüller, JRC Nurse, CW Probst
International Conference on Human Aspects of Information Security, Privacy …, 2016
342016
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SH Van Der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
302012
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
282006
From flow logic to static type systems for coordination languages
R De Nicola, D Gorla, RR Hansen, F Nielson, HR Nielson, CW Probst, ...
Science of Computer Programming 75 (6), 376-397, 2010
272010
Non-interference and erasure policies for java card bytecode
RR Hansen, CW Probst
6th International Workshop on Issues in the Theory of Security (WITS’06), 2006
272006
The system can't perform the operation now. Try again later.
Articles 1–20