Follow
Christian W Probst
Christian W Probst
Verified email at unitec.ac.nz
Title
Cited by
Cited by
Year
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 4-27, 2011
3272011
HotpathVM: An effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
2072006
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1412011
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Bringing Theory to Practice: Predictability and Performance in Embedded …, 2011
1412011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
1312010
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
1082018
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
952010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
782007
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
612008
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider threats in cyber security, 1-15, 2010
592010
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
3rd International conference ACECS 16, 233-238, 2016
562016
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Graphical Models for Security: Second International Workshop, GraMSec 2015 …, 2016
462016
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
452015
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
442013
Attack tree analysis for insider threats on the IoT using Isabelle
F Kammüller, JRC Nurse, CW Probst
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
392016
08302 Abstracts Collection--Countering Insider Threats
M Bishop, D Gollmann, J Hunker, CW Probst
Dagstuhl Seminar Proceedings, 2008
382008
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
352015
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SH Van Der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
322012
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
302006
Non-interference and erasure policies for java card bytecode
RR Hansen, CW Probst
6th International Workshop on Issues in the Theory of Security (WITS’06), 2006
282006
The system can't perform the operation now. Try again later.
Articles 1–20