default search action
Thomas Schreck
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2024 Special Issue. DTRAP 5(3): 26:1-26:2 (2024) - [c15]Thomas Geras, Thomas Schreck:
The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence. RAID 2024: 337-352 - [c14]Daniel Schlette, Philip Empl, Marco Caselli, Thomas Schreck, Günther Pernul:
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. SP 2024: 3625-3643 - [c13]Erwin Kupris, Tobias Hilbig, David Pierre Sugar, Thomas Schreck:
A-WAYF: Automated Where Are You From in Multilateral Federations. TDI 2024: 6-17 - 2023
- [j6]Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2023 Special Issue. DTRAP 4(3): 31:1-31:2 (2023) - [j5]Tobias Hilbig, Thomas Geras, Erwin Kupris, Thomas Schreck:
security.txt Revisited: Analysis of Prevalence and Conformity in 2022. DTRAP 4(3): 36:1-36:17 (2023) - [c12]Thomas Geras, Thomas Schreck:
Sharing Communities: The Good, the Bad, and the Ugly. CCS 2023: 2755-2769 - [c11]Christian Ellerhold, Johann Schnagl, Thomas Schreck:
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification. CCSW@CCS 2023: 17-29 - [c10]Tobias Hilbig, Thomas Schreck, Tobias Limmer:
'State of the Union': Evaluating Open Source Zero Trust Components. STM 2023: 42-61 - 2022
- [c9]Tilman Dewes, Tiago Gasiba, Thomas Schreck:
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles. ICPEC 2022: 3:1-3:12
2010 – 2019
- 2018
- [b1]Thomas Schreck:
IT Security Incident Response: Current State, Emerging Problems, and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger Stand, Probleme und neue Methodiken). University of Erlangen-Nuremberg, Germany, 2018 - 2017
- [c8]Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck:
Mining Attributed Graphs for Threat Intelligence. CODASPY 2017: 15-22 - 2016
- [c7]Tobias Wüchner, Martín Ochoa, Mojdeh Golagha, Gaurav Srivastava, Thomas Schreck, Alexander Pretschner:
MalFlow: identification of C&C servers through host-based data flow profiling. SAC 2016: 2087-2094 - 2015
- [j4]Bernd Grobauer, Klaus-Peter Kossakowski, Thomas Schreck:
Klassifikation von IT-Sicherheitsvorfällen. Datenschutz und Datensicherheit 40(1): 17-21 (2015) - [j3]Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Daniel Arp, Johannes Hoffmann:
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. Int. J. Inf. Sec. 14(2): 141-153 (2015) - 2013
- [c6]Michael Spreitzenbarth, Felix C. Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann:
Mobile-sandbox: having a deeper look into android applications. SAC 2013: 1808-1815 - 2012
- [c5]Thomas Schreck, Stefan Berger, Jan Göbel:
BISSAM: Automatic Vulnerability Identification of Office Documents. DIMVA 2012: 204-213 - [c4]Andreas Dewald, Felix C. Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, Carsten Willems:
Analyse und Vergleich von BckR2D2-I und II. Sicherheit 2012: 47-58 - 2010
- [c3]Bernd Grobauer, Thomas Schreck:
Towards incident handling in the cloud: challenges and approaches. CCSW 2010: 77-86
2000 – 2009
- 2007
- [c2]Niklas Steinleitner, Xiaoming Fu, Dieter Hogrefe, Thomas Schreck, Hannes Tschofenig:
An NSIS-based approach for firewall traversal in mobile IPv6 networks. WICON 2007: 15 - 2000
- [j2]Thomas Schreck, Zhengxin Chen:
Branch grafting method for R-tree implementation. J. Syst. Softw. 53(1): 83-93 (2000) - [c1]Thomas Schreck, Zhengxin Chen:
R-Tree Implementation Using Branch-Grafting Method. SAC (1) 2000: 328-332
1990 – 1999
- 1997
- [j1]Thomas Schreck, Zhengxin Chen:
Implementation of locking schemes in extended dependency graphs. Inf. Softw. Technol. 39(7): 477-483 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint