Christian W. Probst
Orcid: 0000-0001-5089-9155Affiliations:
- Unitec Institute of Technology, High Tech Transdisciplinary Research Network, Auckland, New Zealand
- Technical University of Denmark, Department of Applied Mathematics and Computer Science (former)
According to our database1,
Christian W. Probst
authored at least 85 papers
between 2002 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on unitec.ac.nz
-
on orcid.org
On csauthors.net:
Bibliography
2022
Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
2021
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis.
CoRR, 2020
2019
CoRR, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Syst. J., 2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Dagstuhl Reports, 2016
A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service.
Proceedings of the Product-Focused Software Process Improvement, 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the Semantics, Logics, and Calculi, 2016
2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015
Proceedings of the Cloud Security Ecosystem, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Proceedings of the 6th Workshop on the Theory and Practice of Provenance, 2014
Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
The Guided System Development Framework: Modeling and Verifying Communication Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
J. Internet Serv. Inf. Secur., 2013
2012
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501).
Dagstuhl Reports, 2012
A move in the security measurement stalemate: elo-style ratings to quantify vulnerability.
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the European Data Protection: In Good Health?, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the Bringing Theory to Practice: Predictability and Performance in Embedded Systems, 2011
Proceedings of the IJCAI 2011 Workshop on Configuration, Barcelona, Spain, July 16, 2011, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Sci. Comput. Program., 2010
Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction.
Proceedings of the STAIRS 2010, 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
Security audits of multi-tier virtual infrastructures in public infrastructure clouds.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
2008
ACM Trans. Program. Lang. Syst., 2008
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
A new way of estimating compute-boundedness and its application to dynamic voltage scaling.
Int. J. Embed. Syst., 2007
Automatic generation of machine emulators: Efficient synthesis of robust virtual machines for legacy software migration.
Proceedings of the Software Engineering 2007, 2007
07041 Working Group - Towards Interfaces for Integrated Performance and Power Analysis and Simulation.
Proceedings of the Power-aware Computing Systems, 21.01. - 26.01.2007, 2007
Proceedings of the Power-aware Computing Systems, 21.01. - 26.01.2007, 2007
Proceedings of the Power-aware Computing Systems, 21.01. - 26.01.2007, 2007
2006
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
Linguistic support for modern operating systems workshop on programming languages and operating systems 2006 (PLOS 2006).
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, 2006
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Sci. Comput. Program., 2005
Proceedings of the Fourth International Workshop on Compiler Optimization meets Compiler Verification, 2005
Proceedings of the First International Workshop on Abstract Interpretation of Object-oriented Languages, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing.
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005
Proceedings of the Power-aware Computing Systems, 3.-8. April 2005, 2005
2002
Proceedings of the Static Analysis, 9th International Symposium, 2002
COD Verlag, ISBN: 978-3-9807096-0-6, 2002