Publications
Export 3 results:
Author Title Type [ Year
] Filters: Keyword is Insider threats and Author is C. W. Probst [Clear All Filters]
.
2015. Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal. 99:1–12.
.
2015. Modelling Social-Technical Attacks with Timed Automata. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Denver, Colorado, US. :21–28.
.
2016. Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Systems Journal.


