Publications

Export 3 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Insider threats  [Clear All Filters]
2015
Kammüller F., Probst C.W.  2015.  Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.
David N., David A., Hansen R.R, Larsen K.G, Legay A., Olesen M.C, Probst C.W.  2015.  Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.