Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks
Weizhi Meng, Choo, Kim-Kwang Raymond, Furnell, Steven, Vasilakos, Athanasios V., Probst, Christian W.
Published in IEEE eTransactions on network and service management (01.06.2018)
Published in IEEE eTransactions on network and service management (01.06.2018)
Get full text
Journal Article
Behavioural Profiling in Cyber-Social Systems
Perno, Jason, Probst, Christian W.
Published in Human Aspects of Information Security, Privacy and Trust (2017)
Published in Human Aspects of Information Security, Privacy and Trust (2017)
Get full text
Book Chapter
Formal Modelling and Analysis of Socio-Technical Systems
Probst, Christian W., Kammüller, Florian, Hansen, René Rydhof
Published in Semantics, Logics, and Calculi (01.01.2016)
Published in Semantics, Logics, and Calculi (01.01.2016)
Get full text
Book Chapter
Automatic generation of application specific FPGA multicore accelerators
Hindborg, Andreas Erik, Schleuniger, Pascal, Jense, Nicklas Bo, Walter, Maxwell, Brock-Nannestad, Laust, Bonnichsen, Lars, Probst, Christian W., Karlsson, Sven
Published in 2014 48th Asilomar Conference on Signals, Systems and Computers (01.11.2014)
Published in 2014 48th Asilomar Conference on Signals, Systems and Computers (01.11.2014)
Get full text
Conference Proceeding
On the Meaning and Purpose of Attack Trees
Mantel, Heiko, Probst, Christian W.
Published in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (01.06.2019)
Published in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (01.06.2019)
Get full text
Conference Proceeding
A portable virtual machine target for proof-carrying code
Franz, Michael, Chandra, Deepak, Gal, Andreas, Haldar, Vivek, Probst, Christian W., Reig, Fermín, Wang, Ning
Published in Science of computer programming (01.09.2005)
Published in Science of computer programming (01.09.2005)
Get full text
Journal Article
The Attack Navigator
Probst, Christian W., Willemson, Jan, Pieters, Wolter
Published in Graphical Models for Security (01.01.2016)
Published in Graphical Models for Security (01.01.2016)
Get full text
Book Chapter
Model based analysis of insider threats
Taolue Chen, Tingting Han, Kammueller, Florian, Nemli, Ibrahim, Probst, Christian W.
Published in 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) (01.06.2016)
Published in 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) (01.06.2016)
Get full text
Conference Proceeding
Transforming Graphical System Models to Graphical Attack Models
Ivanova, Marieta Georgieva, Probst, Christian W., Hansen, René Rydhof, Kammüller, Florian
Published in Graphical Models for Security (01.01.2016)
Published in Graphical Models for Security (01.01.2016)
Get full text
Book Chapter
Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis
Kammuller, Florian, Probst, Christian W.
Published in 2014 IEEE Security and Privacy Workshops (01.05.2014)
Published in 2014 IEEE Security and Privacy Workshops (01.05.2014)
Get full text
Conference Proceeding
Graphical Models for Security: 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers
Year of Publication 2019
Get full text
Conference Proceeding