Christian W Probst
Christian W Probst
Verified email at
TitleCited byYear
HotpathVM: an effective JIT compiler for resource-constrained devices
A Gal, CW Probst, M Franz
Proceedings of the 2nd international conference on Virtual execution …, 2006
Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J Hunker, CW Probst
JoWUA 2 (1), 4-27, 2011
Towards a time-predictable dual-issue microprocessor: The Patmos approach
M Schoeberl, P Schleuniger, W Puffitsch, F Brandner, CW Probst, ...
Workshop on Bringing Theory to Practice: Predictability and Performance in …, 2011
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
S Bleikertz, M Schunter, CW Probst, D Pendarakis, K Eriksson
Proceedings of the 2010 ACM workshop on Cloud computing security workshop …, 2010
Where can an insider attack?
CW Probst, RR Hansen, F Nielson
International Workshop on Formal Aspects in Security and Trust, 127-142, 2006
Insider threats in cyber security
CW Probst, J Hunker, M Bishop, D Gollmann
Springer Science & Business Media, 2010
An extensible analysable system model
CW Probst, RR Hansen
Information security technical report 13 (4), 235-246, 2008
Invalidating policies using structural information
F Kammüller, CW Probst
2013 IEEE Security and Privacy Workshops, 76-81, 2013
Aspects of insider threats
CW Probst, J Hunker, D Gollmann, M Bishop
Insider Threats in Cyber Security, 1-15, 2010
Transforming graphical system models to graphical attack models
MG Ivanova, CW Probst, RR Hansen, F Kammüller
International Workshop on Graphical Models for Security, 82-96, 2015
08302 Abstracts Collection--Countering Insider Threats
M Bishop, D Gollmann, J Hunker, CW Probst
Dagstuhl Seminar Proceedings, 2008
Sandboxing in myKlaim
RR Hansen, CW Probst, F Nielson
First International Conference on Availability, Reliability and Security …, 2006
Modeling and verification of insider threats using logical analysis
F Kammüller, CW Probst
IEEE systems journal 11 (2), 534-545, 2015
A move in the security measurement stalemate: Elo-style ratings to quantify vulnerability
W Pieters, SHG van der Ven, CW Probst
Proceedings of the 2012 New Security Paradigms Workshop, 1-14, 2012
Hand gesture recognition using leap motion controller for recognition of arabic sign language
B Khelil, H Amiri, T Chen, F Kammüller, I Nemli, CW Probst
Lect. Notes Comput. Sci, 2016
Attack tree generation by policy invalidation
MG Ivanova, CW Probst, RR Hansen, F Kammüller
IFIP International Conference on Information Security Theory and Practice …, 2015
Modular control flow analysis for libraries
CW Probst
International Static Analysis Symposium, 165-179, 2002
Combining generated data models with formal invalidation for insider threat analysis
F Kammüller, CW Probst
2014 IEEE Security and Privacy Workshops, 229-235, 2014
A denial of service attack on the Java bytecode verifier
A Gal, CW Probst, MSO Franz
School of Information and Computer Science, University of California, Irvine, 2003
Privacy penetration testing: How to establish trust in your cloud provider
CW Probst, MA Sasse, W Pieters, T Dimkov, E Luysterborg, M Arnaud
European Data Protection: In Good Health?, 251-265, 2012
The system can't perform the operation now. Try again later.
Articles 1–20