Christian W. Probst

Orcid: 0000-0001-5089-9155

Affiliations:
  • Unitec Institute of Technology, High Tech Transdisciplinary Research Network, Auckland, New Zealand
  • Technical University of Denmark, Department of Applied Mathematics and Computer Science (former)


According to our database1, Christian W. Probst authored at least 85 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

2021
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis.
CoRR, 2020

2019
Designing Data Protection for GDPR Compliance into IoT Healthcare Systems.
CoRR, 2019

On the Meaning and Purpose of Attack Trees.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Estimating the Risk of Fraud Against E-Services.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Modelling and Analysing Overlay Networks by Ambients with Wormholes.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Modeling and Verification of Insider Threats Using Logical Analysis.
IEEE Syst. J., 2017

Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Behavioural Profiling in Cyber-Social Systems.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
The Navigation Metaphor in Security Economics.
IEEE Secur. Priv., 2016

Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461).
Dagstuhl Reports, 2016

A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service.
Proceedings of the Product-Focused Software Process Improvement, 2016

Understanding How Components of Organisations Contribute to Attacks.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Guaranteeing Privacy-Observing Data Exchange.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Model based analysis of insider threats.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Towards Formal Analysis of Insider Threats for Auctions.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Formal Modelling and Analysis of Socio-Technical Systems.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Implementation of BT-trees.
CoRR, 2015

Attack Tree Generation by Policy Invalidation.
Proceedings of the Information Security Theory and Practice, 2015

Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Probabilistic Analysis Framework for Malicious Insider Threats.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Secure Refactoring with Java Information Flow.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

The Attack Navigator.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

Transforming Graphical System Models to Graphical Attack Models.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

Modelling Social-Technical Attacks with Timed Automata.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Modelling and Analysing Socio-Technical Systems.
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

Tool-based risk assessment of cloud infrastructures as socio-technical systems.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Invalidating Policies using Structural Information.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Model-based Abstraction of Data Provenance.
Proceedings of the 6th Workshop on the Theory and Practice of Provenance, 2014

Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

The Guided System Development Framework: Modeling and Verifying Communication Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

Automatic generation of application specific FPGA multicore accelerators.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Foreword.
Sci. Comput. Program., 2013

Reachability-based Impact as a Measure for Insiderness.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Externalizing Behaviour for Analysing System Models.
J. Internet Serv. Inf. Secur., 2013

ELB-Trees, An Efficient and Lock-free B-tree Derivative.
CoRR, 2013

2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012

A move in the security measurement stalemate: elo-style ratings to quantify vulnerability.
Proceedings of the New Security Paradigms Workshop, 2012

Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider.
Proceedings of the European Data Protection: In Good Health?, 2012

2011
Addressing Insider Threats and Information Leakage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Identifying and Mitigating Insider Threats.
it Inf. Technol., 2011

Secure Architectures in the Cloud (Dagstuhl Seminar 11492).
Dagstuhl Reports, 2011

Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach.
Proceedings of the Bringing Theory to Practice: Predictability and Performance in Embedded Systems, 2011

Modelling Configuration Knowledge in Heterogeneous Product Families.
Proceedings of the IJCAI 2011 Workshop on Configuration, Barcelona, Spain, July 16, 2011, 2011

2010
Aspects of Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

From Flow Logic to static type systems for coordination languages.
Sci. Comput. Program., 2010

Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction.
Proceedings of the STAIRS 2010, 2010

Protocol Implementation Generator.
Proceedings of the Information Security Technology for Applications, 2010

10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010

10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010

Security audits of multi-tier virtual infrastructures in public infrastructure clouds.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
The Risk of Risk Analysis-And its relation to the Economics of Insider Threats.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Analysing Access Control Specifications.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Fluid information systems.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

2008
Java bytecode verification via static single assignment form.
ACM Trans. Program. Lang. Syst., 2008

An extensible analysable system model.
Inf. Secur. Tech. Rep., 2008

08302 Summary - Countering Insider Threats.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

08302 Abstracts Collection - Countering Insider Threats.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

Static Validation of Licence Conformance Policies.
Proceedings of the The Third International Conference on Availability, 2008

2007
A new way of estimating compute-boundedness and its application to dynamic voltage scaling.
Int. J. Embed. Syst., 2007

Power-aware computing systems.
Int. J. Embed. Syst., 2007

Automatic generation of machine emulators: Efficient synthesis of robust virtual machines for legacy software migration.
Proceedings of the Software Engineering 2007, 2007

07041 Working Group - Towards Interfaces for Integrated Performance and Power Analysis and Simulation.
Proceedings of the Power-aware Computing Systems, 21.01. - 26.01.2007, 2007

07041 Abstracts Collection - Power-aware Computing Systems.
Proceedings of the Power-aware Computing Systems, 21.01. - 26.01.2007, 2007

07041 Summary - Power-aware Computing Systems.
Proceedings of the Power-aware Computing Systems, 21.01. - 26.01.2007, 2007

2006
HotpathVM: an effective JIT compiler for resource-constrained devices.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

Program Partitioning Using Dynamic Trust Models.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Where Can an Insider Attack?
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Linguistic support for modern operating systems workshop on programming languages and operating systems 2006 (PLOS 2006).
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, 2006

Issues in holistic system design.
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, 2006

Sandboxing in myKlaim.
Proceedings of the The First International Conference on Availability, 2006

2005
A portable virtual machine target for proof-carrying code.
Sci. Comput. Program., 2005

Structural Encoding of Static Single Assignment Form.
Proceedings of the Fourth International Workshop on Compiler Optimization meets Compiler Verification, 2005

Integrated Java Bytecode Verification.
Proceedings of the First International Workshop on Abstract Interpretation of Object-oriented Languages, 2005

Average case vs. worst case: margins of safety in system design.
Proceedings of the New Security Paradigms Workshop 2005, 2005

A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing.
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005

05141 Abstracts Collection - Power-aware Computing Systems.
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005

05141 Summary - Power-aware Computing Systems.
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005

2002
Modular Control Flow Analysis for Libraries.
Proceedings of the Static Analysis, 9th International Symposium, 2002

A demand-driven solver for constraint-based control flow analysis.
COD Verlag, ISBN: 978-3-9807096-0-6, 2002


  Loading...