Zobrazeno 1 - 10
of 67
pro vyhledávání: '"Christian W. Probst"'
Autor:
Raúl Pardo, Willard Rafnsson, Gregor Steinhorn, Denis Lavrov, Thomas Lumley, Christian W. Probst, Ilze Ziedins, Andrzej Wąsowski
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031257339
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::690961b8f35958bf220b4852217200c3
https://doi.org/10.1007/978-3-031-25734-6_7
https://doi.org/10.1007/978-3-031-25734-6_7
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884277
ESORICS (2)
ESORICS (2)
Disclosure of data analytics results has important scientific and commercial justifications. However, no data shall be disclosed without a diligent investigation of risks for privacy of subjects. Privug is a tool-supported method to explore informati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c280cd3881fc9ff8ac37ba8d69c704b5
https://doi.org/10.1007/978-3-030-88428-4_21
https://doi.org/10.1007/978-3-030-88428-4_21
Autor:
Heiko Mantel, Christian W. Probst
Publikováno v:
CSF
Attack trees are a popular notation for describing threats to systems, both in academia and industry. Originally, attack trees lacked a formal semantics, but formal semantics for different variants of attack trees were proposed later. These semantics
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030365363
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecbe988c274423917b0a485072ae83d1
https://doi.org/10.1007/978-3-030-36537-0
https://doi.org/10.1007/978-3-030-36537-0
Publikováno v:
Agile and Lean Concepts for Teaching and Learning ISBN: 9789811327506
Software architecture plays a vital role in the analysis, design, evaluation and evolution of large-scale projects. Successful adoption of an agile methodology in large-scale projects requires not only tailoring of the software architecture analysis,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c55b8f75b092ec45a5af5b4989889549
https://doi.org/10.1007/978-981-13-2751-3_16
https://doi.org/10.1007/978-981-13-2751-3_16
Publikováno v:
ICMU
Hansen, R R & Probst, C W 2018, Modelling and Analysing Overlay Networks by Ambients with Wormholes . in 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018 ., 8653596, IEEE Signal Processing Society, 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, Auckland, New Zealand, 05/10/2018 . https://doi.org/10.23919/ICMU.2018.8653596
Hansen, R R & Probst, C W 2018, Modelling and Analysing Overlay Networks by Ambients with Wormholes . in 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018 ., 8653596, IEEE Signal Processing Society, 2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018, Auckland, New Zealand, 05/10/2018 . https://doi.org/10.23919/ICMU.2018.8653596
Process calculi are a powerful mechanism to formally model distributed systems, and are especially useful for assessing trust, security, and privacy issues in mobile and ubiquitous computing and networking. However, they often only support a single m
Autor:
Steven Furnell, Athanasios V. Vasilakos, Weizhi Meng, Kim-Kwang Raymond Choo, Christian W. Probst
Publikováno v:
Meng, W, Choo, K-K R, Furnell, S, Vasilakos, A V & Probst, C W 2018, ' Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks ', IEEE Transactions on Network and Service Management, vol. 15, no. 2, pp. 761-773 . https://doi.org/10.1109/TNSM.2018.2815280
© 2004-2012 IEEE. The medical industry is increasingly digitalized and Internet-connected (e.g., Internet of Medical Things), and when deployed in an Internet of Medical Things environment, software-defined networks (SDNs) allow the decoupling of ne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a7cb01c2dd4d73236b6ce74f2a4ad2b2
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing
Publikováno v:
Information Security and Privacy ISBN: 9783319936376
ACISP
ACISP
To construct an intelligent alarm filter is a promising solution to help reduce false alarms for an intrusion detection system (IDS), in which an appropriate algorithm can be selected in an adaptive way. Taking the advantage of cloud computing, the p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e853f17336a8f529b029031cad49cf90
https://doi.org/10.1007/978-3-319-93638-3_44
https://doi.org/10.1007/978-3-319-93638-3_44
Autor:
Christian W. Probst, Ahmed Seid Yesuf
Publikováno v:
Secure IT Systems ISBN: 9783030036379
NordSec
NordSec
Industry is continuously developing, deploying, and maintaining e-services to transform traditional offerings. While protection of traditional services is well understood, their digital transformation often is vulnerable to known and new attacks. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::54af720338d1f110ca3536436396f8cf
https://doi.org/10.1007/978-3-030-03638-6_19
https://doi.org/10.1007/978-3-030-03638-6_19