Thomas Schreck
Thomas Schreck
Verified email at - Homepage
Cited by
Cited by
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann
International Journal of Information Security 14, 141-153, 2015
Towards incident handling in the cloud: challenges and approaches
B Grobauer, T Schreck
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 77-86, 2010
Mining attributed graphs for threat intelligence
H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
Risk factors for ulcerative colitis-associated colorectal cancer: A retrospective cohort study
EF de Campos Silva, JP Baima, JR de Barros, SE Tanni, T Schreck, ...
Medicine 99 (32), e21686, 2020
BISSAM: Automatic vulnerability identification of office documents
T Schreck, S Berger, J Göbel
International conference on detection of intrusions and malware, and …, 2012
MalFlow: identification of C&C servers through host-based data flow profiling
T Wüchner, M Ochoa, M Golagha, G Srivastava, T Schreck, A Pretschner
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2087-2094, 2016
Analyse und Vergleich von BckR2D2-I und II
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ...
Foreclosure discounts for German housing markets
T Just, M Heinrich, MA Maurin, T Schreck
International Journal of Housing Markets and Analysis 13 (2), 143-163, 2020
The MANTIS Framework: Cyber Threat Intelligence Management for CERTs
B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger
Boston, US, Jun, 2014
Klassifikation von IT-Sicherheitsvorfällen
B Grobauer, KP Kossakowski, T Schreck
Datenschutz und Datensicherheit-DuD 40 (1), 17-21, 2016
Different clusters in patients with chronic obstructive pulmonary disease (Copd): a two-center study in brazil
JW Zucchi, EAT Franco, T Schreck, MH Castro e Silva, SRDS Migliorini, ...
International Journal of chronic obstructive pulmonary disease, 2847-2856, 2020
IT security incident response: Current state, emerging problems, and new approaches
T Schreck
PQDT-Global, 2018
An nsis-based approach for firewall traversal in mobile ipv6 networks
N Steinleitner, X Fu, D Hogrefe, T Schreck, H Tschofenig
3rd International ICSTConference on Wireless Internet, 2010
Do you play it by the books? A study on incident response playbooks and influencing factors
D Schlette, P Empl, M Caselli, T Schreck, G Pernul
2024 IEEE Symposium on Security and Privacy (SP), 60-60, 2023
security. txt Revisited: Analysis of Prevalence and Conformity in 2022
T Hilbig, T Geras, E Kupris, T Schreck
Digital Threats: Research and Practice 4 (3), 1-17, 2023
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles
T Dewes, T Gasiba, T Schreck
Third International Computer Programming Education Conference (ICPEC 2022), 2022
Auswirkungen von Solvency II auf die Immobilienanlagen europäischer Versicherer
M Heinrich, T Just, T Schreck
IREBS International Real Estate Business School, Universität Regensburg, 2015
The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs
B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger, S CERT
Retrieved 12/1/2014 from FIRST. http://www. first. org/resources/papers …, 2014
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification
C Ellerhold, J Schnagl, T Schreck
Proceedings of the 2023 on Cloud Computing Security Workshop, 17-29, 2023
The system can't perform the operation now. Try again later.
Articles 1–20