Open main menu Close main menu

Dr Christian Probst

Director High Technology Transdisciplinary Research Network
High Tech Research
Location: Building 183, Room 3001

Qualifications

Doctor of Engineering Sciences, Saarland University

Publications

Perno, J., & Probst, C. W. (2017). Behavioural Profiling in Cyber-Social Systems. Tryfonas, T. 19th International Conference on Human-Computer Interaction (Vol. 10292).

Kammüller, F., & Probst, CW. (2017). Modeling and verification of insider threats using logical analysis. IEEE Systems Journal (Vol. 11(2)).

Chen, T., Han, T., Kammüller, F., Nemli, I., & Probst, C. W. (2016). Model based analysis of insider threats. xx, Cyber Security And Protection Of Digital Services.

Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W., & Verbij, R. (2016). The navigation metaphor in security economics. IEEE Security and Privacy Magazine (Vol. 14(3)).

Chauhan, M. A., Babar, M. A., & Probst, C. W. (2016). A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service. Abrahamsson P., Jedlitschka A., Nguyen Duc A., Felderer M., Amasaki S., Mikkonen T. PROFES (Vol. 10027).

Probst, C. W. (2016). Guaranteeing Privacy-Observing Data Exchange. Margaria T., Steffen B. ISoLA (Vol. 9952).

Probst, C. W., Kammüller, F., & Hansen, R. R. (2015). Formal Modelling and Analysis of Socio-Technical Systems. Probst C., Hankin C., Hansen R. Semantics, Logics, and Calculi (Vol. 9560).

Probst, C. W., Willemson, J., & Pieters, W. (2015). The Attack Navigator. Mauw S., Kordy B., Jajodia S. GraMSecCSF (Vol. 9390).

Ivanova, M. G., Probst, C.W., Hansen, R.R., & Kammüller, F. (2015). Attack tree generation by policy invalidation. R. Akram & S. Jajodia, Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Lecture Notes in Computer Science (Vol. 9311).

Ivanova, M. G., Probst, C. W., Hansen, R. R., & Kammüller, F. (2015). Transforming graphical system models to graphical attack models. S. Mauw, B. Kordy & S. Jajodia, Proceedings of the International Workshop on Graphical Models for Security (GraMSec 2015). Lecture Notes in Computer Science (Vol. 9390).

Kammüller, F., & Probst, C. W. (2015). Modeling and verification of insider threats using logical analysis. IEEE Systems Journal (Vol. 11(2)).

David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Probst, C. W. (2015). Modelling social-technical attacks with timed automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats Threats (MIST 2015).

Nidd, M., Ivanova, M. G., Probst, C. W., & Tanner, A. (2015). Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. Ryan Ko, Kim-Kwang Raymond Choo, Switzerland.

Pieters, W., Probst, CW., Lukszo, Z., & Montoya, L. (2014). Cost-effectiveness of security measures: A model-based framework. Tsiakis, T., Kargidis, T. & Katsaros, P. Hershey, PA.

Jensen, N. B., Karlsson, S., & Probst, C. W. (2014). Compiler feedback using continuous dynamic compilation during development. Proceedings of the Workshop on Dynamic Compilation Everywhere (DCE 2014).

Kammüller, F., & Probst, C. W. (2014). Combining generated data models with formal invalidation for insider threat analysis. Proceedings of the IEEE Security and Privacy Workshops (SPW 2014).

Kammüller, F., & Probst, C. W. (2014). Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (Vol. 5(2)).