Christian W. Probst

  1. 2018
  2. Published

    Insider threats and auctions : Formalization, mechanized proof, and code generation. / Kammüller, Florian; Kerber, Manfred; Probst, Christian W.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 8, No. 1, 01.06.2018, p. 44-78.

    Research output: Contribution to journalJournal article – Annual report year: 2019Researchpeer-review

  3. Published

    Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. / Meng, Weizhi; Choo, Kim-Kwang Raymond; Furnell, Steven; Vasilakos, Athanasios V.; Probst, Christian W.

    In: IEEE Transactions on Network and Service Management, Vol. 15, No. 2, 2018, p. 761-773.

    Research output: Contribution to journalJournal article – Annual report year: 2018Researchpeer-review

  4. 2017
  5. Published

    Architecturally Significant Requirements Identification, Classification and Change Management for Multi-tenant Cloud-Based Systems. / Chauhan, Muhammad Aufeef; Probst, Christian W.

    Requirements Engineering for Service and Cloud Computing. Springer, 2017. p. 181-205 (Requirements Engineering for Service and Cloud Computing).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter – Annual report year: 2017Researchpeer-review

  6. Published

    Behavioural Profiling in Cyber-Social Systems. / Perno, Jason; Probst, Christian W.

    HAS 2017: Human Aspects of Information Security, Privacy and Trust . ed. / Theo Tryfonas. Vol. 10292 Springer, 2017. p. 507-517 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2018Researchpeer-review

  7. Published

    Do we educate engineers that can engineer? / Nyborg, Mads; Probst, Christian W.

    Proceedings of the 13th International CDIO Conference. 2017. p. 12.

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2017Researchpeer-review

  8. Published

    Modeling and Verification of Insider Threats Using Logical Analysis. / Kammuller, Florian; Probst, Christian W.

    In: I E E E Systems Journal, Vol. 11, No. 2, 2017, p. 534-545.

    Research output: Contribution to journalJournal article – Annual report year: 2017Researchpeer-review

  9. 2016
  10. Published

    A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service. / Chauhan, Muhammad Aufeef; Babar, Muhammad Ali; Probst, Christian W.

    Proceedings of the 17th International Conference on Product-Focused Software Process Improvement (PROFES 2016). Springer, 2016. p. 111-126 (Lecture Notes in Computer Science, Vol. 10027).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2016Researchpeer-review

  11. Published

    Attack tree analysis for insider threats on the IoT using isabelle. / Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. ed. / Theo Tryfonas. Vol. 9750 Springer, 2016. p. 234-246 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2016Researchpeer-review

  12. Published

    Formal modelling and analysis of socio-technical systems. / Probst, Christian W.; Kammüller, Florian; Hansen, Rene Rydhof.

    Semantics, Logics, and Calculi: Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. ed. / Christian W. Probst; Chris Hankin; René Rydhof Hansen. Springer, 2016. p. 54-73 (Lecture Notes in Computer Science, Vol. 9560).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2016Researchpeer-review

  13. Published

    Guaranteeing Privacy-Observing Data Exchange. / Probst, Christian W.

    Proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation - Foundational Techniques (ISoLA 2016): Part I. Springer, 2016. p. 958-969 (Lecture Notes in Computer Science, Vol. 9952).

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2016Researchpeer-review

Previous 1 2 3 4 5 6 7 8 ...10 Next