Mobile-sandbox: having a deeper look into android applications M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013 | 448 | 2013 |
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann International Journal of Information Security 14, 141-153, 2015 | 143 | 2015 |
Towards incident handling in the cloud: challenges and approaches B Grobauer, T Schreck Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 77-86, 2010 | 126 | 2010 |
Mining attributed graphs for threat intelligence H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 41 | 2017 |
Risk factors for ulcerative colitis-associated colorectal cancer: A retrospective cohort study EF de Campos Silva, JP Baima, JR de Barros, SE Tanni, T Schreck, ... Medicine 99 (32), e21686, 2020 | 29 | 2020 |
BISSAM: Automatic vulnerability identification of office documents T Schreck, S Berger, J Göbel International conference on detection of intrusions and malware, and …, 2012 | 24 | 2012 |
MalFlow: identification of C&C servers through host-based data flow profiling T Wüchner, M Ochoa, M Golagha, G Srivastava, T Schreck, A Pretschner Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2087-2094, 2016 | 7 | 2016 |
Analyse und Vergleich von BckR2D2-I und II A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ... | 7 | 2011 |
Foreclosure discounts for German housing markets T Just, M Heinrich, MA Maurin, T Schreck International Journal of Housing Markets and Analysis 13 (2), 143-163, 2020 | 6 | 2020 |
The MANTIS Framework: Cyber Threat Intelligence Management for CERTs B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger Boston, US, Jun, 2014 | 6 | 2014 |
Do you play it by the books? A study on incident response playbooks and influencing factors D Schlette, P Empl, M Caselli, T Schreck, G Pernul 2024 IEEE Symposium on Security and Privacy (SP), 3625-3643, 2024 | 5 | 2024 |
Klassifikation von IT-Sicherheitsvorfällen B Grobauer, KP Kossakowski, T Schreck Datenschutz und Datensicherheit-DuD 40 (1), 17-21, 2016 | 4 | 2016 |
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification C Ellerhold, J Schnagl, T Schreck Proceedings of the 2023 on Cloud Computing Security Workshop, 17-29, 2023 | 3 | 2023 |
Sharing Communities: The Good, the Bad, and the Ugly T Geras, T Schreck Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
Different clusters in patients with chronic obstructive pulmonary disease (Copd): a two-center study in brazil JW Zucchi, EAT Franco, T Schreck, MH Castro e Silva, SRDS Migliorini, ... International Journal of chronic obstructive pulmonary disease, 2847-2856, 2020 | 3 | 2020 |
IT security incident response: Current state, emerging problems, and new approaches T Schreck PQDT-Global, 2018 | 3 | 2018 |
An nsis-based approach for firewall traversal in mobile ipv6 networks N Steinleitner, X Fu, D Hogrefe, T Schreck, H Tschofenig 3rd International ICSTConference on Wireless Internet, 2010 | 3 | 2010 |
security. txt Revisited: Analysis of Prevalence and Conformity in 2022 T Hilbig, T Geras, E Kupris, T Schreck Digital Threats: Research and Practice 4 (3), 1-17, 2023 | 2 | 2023 |
‘State of the Union’: Evaluating Open Source Zero Trust Components T Hilbig, T Schreck, T Limmer International Workshop on Security and Trust Management, 42-61, 2023 | 2 | 2023 |
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles T Dewes, T Gasiba, T Schreck Third International Computer Programming Education Conference (ICPEC 2022), 2022 | 2 | 2022 |