Export 5 results:Author Title Type [ Year]
Filters: First Letter Of Title is M and Author is C. W. Probst [Clear All Filters]
Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.. 2016.
Modeling and Analysing Socio-Technical Systems. 1st International Workshop on Socio-Technical Perspective in IS development (STPIS), Stockholm, Sweden. 1374:121–124.. 2015.
Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.. 2015.
Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.. 2015.
Model-based Abstraction of Data Provenance. 6th USENIX Workshop on the Theory and Practice of Provenance, Cologne, Germany. :Article3.. 2014.