Publications

Export 3 results:
Author [ Title(Asc)] Type Year
Filters: Keyword is Insider threats and Author is C. W. Probst  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
Kammüller F., Probst C.W.  2016.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.
Kammüller F., Probst C.W.  2015.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.