Buildings 111, 112, 113, 114 and 115 on our Mt Albert campus are temporarily closed

Open main menu Close main menu

Dr Christian Probst

Adjunct Professor
School of Computing, Electrical and Applied Technology
Location: Building 183, Room 3001

Publications

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J., & Probst, C. W. (2018). Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. W. Susilo & G. Yang, 23rd Australasian Conference on Information Security and Privacy.

Yesuf, AS., & Probst, CW. (2018). Estimating the Risk of Fraud Against E-Services. 23rd Nordic Conference on Secure IT Systems.

Chauhan, MA., Probst, CW., & Babar, MA. (2018). Agile Approaches for Teaching and Learning Software Architecture Design Processes and Methods. Parsons D., MacCallum K. Singapore.

Meng, W., Choo, K-K R., Furnell, S., Vasilakos, AV., & Probst, CW. (2018). Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Transactions on Network and Service Management (Vol. 15(2)).

Probst, CW. (2018). Cyber Security and Artificial Intelligence. 2018 AI x CyberSecurity Summit, Chongqing, China.

Kammüller, F., & Probst, CW. (2017). Modeling and verification of insider threats using logical analysis. IEEE Systems Journal (Vol. 11(2)).

Perno, J., & Probst, C. W. (2017). Behavioural Profiling in Cyber-Social Systems. Tryfonas, T. 19th International Conference on Human-Computer Interaction (Vol. 10292).

Probst, C. W. (2016). Guaranteeing Privacy-Observing Data Exchange. Margaria T., Steffen B. ISoLA (Vol. 9952).

Chauhan, M. A., Babar, M. A., & Probst, C. W. (2016). A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service. Abrahamsson P., Jedlitschka A., Nguyen Duc A., Felderer M., Amasaki S., Mikkonen T. PROFES (Vol. 10027).

Pieters, W., Barendse, J., Ford, M., Heath, C. P. R., Probst, C. W., & Verbij, R. (2016). The navigation metaphor in security economics. IEEE Security and Privacy Magazine (Vol. 14(3)).

Chen, T., Han, T., Kammüller, F., Nemli, I., & Probst, C. W. (2016). Model based analysis of insider threats. xx, Cyber Security And Protection Of Digital Services.

Nidd, M., Ivanova, M. G., Probst, C. W., & Tanner, A. (2015). Tool-based Risk Assessment of Cloud Infrastructures as Socio-Technical Systems. Ryan Ko, Kim-Kwang Raymond Choo, Switzerland.

David, N., David, A., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Probst, C. W. (2015). Modelling social-technical attacks with timed automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats Threats (MIST 2015).

Kammüller, F., & Probst, C. W. (2015). Modeling and verification of insider threats using logical analysis. IEEE Systems Journal (Vol. 11(2)).

Ivanova, M. G., Probst, C. W., Hansen, R. R., & Kammüller, F. (2015). Transforming graphical system models to graphical attack models. S. Mauw, B. Kordy & S. Jajodia, Proceedings of the International Workshop on Graphical Models for Security (GraMSec 2015). Lecture Notes in Computer Science (Vol. 9390).

Ivanova, M. G., Probst, C.W., Hansen, R.R., & Kammüller, F. (2015). Attack tree generation by policy invalidation. R. Akram & S. Jajodia, Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Lecture Notes in Computer Science (Vol. 9311).

Probst, C. W., Willemson, J., & Pieters, W. (2015). The Attack Navigator. Mauw S., Kordy B., Jajodia S. GraMSecCSF (Vol. 9390).

Probst, C. W., Kammüller, F., & Hansen, R. R. (2015). Formal Modelling and Analysis of Socio-Technical Systems. Probst C., Hankin C., Hansen R. Semantics, Logics, and Calculi (Vol. 9560).

Kammüller, F., & Probst, C. W. (2014). Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (Vol. 5(2)).

Kammüller, F., & Probst, C. W. (2014). Combining generated data models with formal invalidation for insider threat analysis. Proceedings of the IEEE Security and Privacy Workshops (SPW 2014).

Jensen, N. B., Karlsson, S., & Probst, C. W. (2014). Compiler feedback using continuous dynamic compilation during development. Proceedings of the Workshop on Dynamic Compilation Everywhere (DCE 2014).

Pieters, W., Probst, CW., Lukszo, Z., & Montoya, L. (2014). Cost-effectiveness of security measures: A model-based framework. Tsiakis, T., Kargidis, T. & Katsaros, P. Hershey, PA.