Follow
Thomas Schreck
Thomas Schreck
Professor
Verified email at hm.edu - Homepage
Title
Cited by
Cited by
Year
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
4482013
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann
International Journal of Information Security 14, 141-153, 2015
1432015
Towards incident handling in the cloud: challenges and approaches
B Grobauer, T Schreck
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 77-86, 2010
1262010
Mining attributed graphs for threat intelligence
H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
412017
Risk factors for ulcerative colitis-associated colorectal cancer: A retrospective cohort study
EF de Campos Silva, JP Baima, JR de Barros, SE Tanni, T Schreck, ...
Medicine 99 (32), e21686, 2020
292020
BISSAM: Automatic vulnerability identification of office documents
T Schreck, S Berger, J Göbel
International conference on detection of intrusions and malware, and …, 2012
242012
MalFlow: identification of C&C servers through host-based data flow profiling
T Wüchner, M Ochoa, M Golagha, G Srivastava, T Schreck, A Pretschner
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2087-2094, 2016
72016
Analyse und Vergleich von BckR2D2-I und II
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ...
72011
Foreclosure discounts for German housing markets
T Just, M Heinrich, MA Maurin, T Schreck
International Journal of Housing Markets and Analysis 13 (2), 143-163, 2020
62020
The MANTIS Framework: Cyber Threat Intelligence Management for CERTs
B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger
Boston, US, Jun, 2014
62014
Do you play it by the books? A study on incident response playbooks and influencing factors
D Schlette, P Empl, M Caselli, T Schreck, G Pernul
2024 IEEE Symposium on Security and Privacy (SP), 3625-3643, 2024
52024
Klassifikation von IT-Sicherheitsvorfällen
B Grobauer, KP Kossakowski, T Schreck
Datenschutz und Datensicherheit-DuD 40 (1), 17-21, 2016
42016
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification
C Ellerhold, J Schnagl, T Schreck
Proceedings of the 2023 on Cloud Computing Security Workshop, 17-29, 2023
32023
Sharing Communities: The Good, the Bad, and the Ugly
T Geras, T Schreck
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
Different clusters in patients with chronic obstructive pulmonary disease (Copd): a two-center study in brazil
JW Zucchi, EAT Franco, T Schreck, MH Castro e Silva, SRDS Migliorini, ...
International Journal of chronic obstructive pulmonary disease, 2847-2856, 2020
32020
IT security incident response: Current state, emerging problems, and new approaches
T Schreck
PQDT-Global, 2018
32018
An nsis-based approach for firewall traversal in mobile ipv6 networks
N Steinleitner, X Fu, D Hogrefe, T Schreck, H Tschofenig
3rd International ICSTConference on Wireless Internet, 2010
32010
security. txt Revisited: Analysis of Prevalence and Conformity in 2022
T Hilbig, T Geras, E Kupris, T Schreck
Digital Threats: Research and Practice 4 (3), 1-17, 2023
22023
‘State of the Union’: Evaluating Open Source Zero Trust Components
T Hilbig, T Schreck, T Limmer
International Workshop on Security and Trust Management, 42-61, 2023
22023
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles
T Dewes, T Gasiba, T Schreck
Third International Computer Programming Education Conference (ICPEC 2022), 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20