Open main menu Close main menu

Dr Christian Probst

Head of School Computing and Information Technology / Director HTTRN, School of Computing and Information Technology; Head of School Computing and Information Technology / Director HTTRN, High Tech Research
High Tech Research
Location: Building 183, Room 3001


Doctor of Engineering Sciences, Saarland University


Probst, CW. (2018). Cyber Security and Artificial Intelligence. 2018 AI x CyberSecurity Summit, Chongqing, China.

Meng, W., Choo, K-K R., Furnell, S., Vasilakos, AV., & Probst, CW. (2018). Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Transactions on Network and Service Management (Vol. 15(2)).

Chauhan, MA., Probst, CW., & Babar, MA. (2018). Agile Approaches for Teaching and Learning Software Architecture Design Processes and Methods. Parsons D., MacCallum K. Singapore.

Yesuf, AS., & Probst, CW. (2018). Estimating the Risk of Fraud Against E-Services. 23rd Nordic Conference on Secure IT Systems.

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J., & Probst, C. W. (2018). Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. W. Susilo & G. Yang, 23rd Australasian Conference on Information Security and Privacy.

Perno, J., & Probst, C. W. (2017). Behavioural Profiling in Cyber-Social Systems. Tryfonas, T. 19th International Conference on Human-Computer Interaction (Vol. 10292).

Kammüller, F., & Probst, CW. (2017). Modeling and verification of insider threats using logical analysis. IEEE Systems Journal (Vol. 11(2)).

Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W., & Verbij, R. (2016). The navigation metaphor in security economics. IEEE Security and Privacy Magazine (Vol. 14(3)).

Chauhan, M. A., Babar, M. A., & Probst, C. W. (2016). A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service. Abrahamsson P., Jedlitschka A., Nguyen Duc A., Felderer M., Amasaki S., Mikkonen T. PROFES (Vol. 10027).

Probst, C. W. (2016). Guaranteeing Privacy-Observing Data Exchange. Margaria T., Steffen B. ISoLA (Vol. 9952).

Chen, T., Han, T., Kammüller, F., Nemli, I., & Probst, C. W. (2016). Model based analysis of insider threats. xx, Cyber Security And Protection Of Digital Services.

Probst, C. W., Kammüller, F., & Hansen, R. R. (2015). Formal Modelling and Analysis of Socio-Technical Systems. Probst C., Hankin C., Hansen R. Semantics, Logics, and Calculi (Vol. 9560).

Probst, C. W., Willemson, J., & Pieters, W. (2015). The Attack Navigator. Mauw S., Kordy B., Jajodia S. GraMSecCSF (Vol. 9390).

Ivanova, M. G., Probst, C.W., Hansen, R.R., & Kammüller, F. (2015). Attack tree generation by policy invalidation. R. Akram & S. Jajodia, Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Lecture Notes in Computer Science (Vol. 9311).

Ivanova, M. G., Probst, C. W., Hansen, R. R., & Kammüller, F. (2015). Transforming graphical system models to graphical attack models. S. Mauw, B. Kordy & S. Jajodia, Proceedings of the International Workshop on Graphical Models for Security (GraMSec 2015). Lecture Notes in Computer Science (Vol. 9390).

Kammüller, F., & Probst, C. W. (2015). Modeling and verification of insider threats using logical analysis. IEEE Systems Journal (Vol. 11(2)).

David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Probst, C. W. (2015). Modelling social-technical attacks with timed automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats Threats (MIST 2015).

Nidd, M., Ivanova, M. G., Probst, C. W., & Tanner, A. (2015). Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. Ryan Ko, Kim-Kwang Raymond Choo, Switzerland.

Pieters, W., Probst, CW., Lukszo, Z., & Montoya, L. (2014). Cost-effectiveness of security measures: A model-based framework. Tsiakis, T., Kargidis, T. & Katsaros, P. Hershey, PA.

Jensen, N. B., Karlsson, S., & Probst, C. W. (2014). Compiler feedback using continuous dynamic compilation during development. Proceedings of the Workshop on Dynamic Compilation Everywhere (DCE 2014).

Kammüller, F., & Probst, C. W. (2014). Combining generated data models with formal invalidation for insider threat analysis. Proceedings of the IEEE Security and Privacy Workshops (SPW 2014).

Kammüller, F., & Probst, C. W. (2014). Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (Vol. 5(2)).