Follow
Thomas Schreck
Thomas Schreck
Professor
Verified email at hm.edu - Homepage
Title
Cited by
Cited by
Year
Mobile-sandbox: having a deeper look into android applications
M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann
Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013
3892013
Towards incident handling in the cloud: challenges and approaches
B Grobauer, T Schreck
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 77-86, 2010
1212010
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann
International Journal of Information Security 14 (2), 141-153, 2015
1162015
Mining attributed graphs for threat intelligence
H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
292017
BISSAM: Automatic vulnerability identification of office documents
T Schreck, S Berger, J Göbel
International conference on detection of intrusions and malware, and …, 2012
232012
The MANTIS Framework: Cyber Threat Intelligence Management for CERTs
B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger
Boston, US, Jun, 2014
82014
Analyse und Vergleich von BckR2D2-I und II
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ...
82011
MalFlow: identification of C&C servers through host-based data flow profiling
T Wüchner, M Ochoa, M Golagha, G Srivastava, T Schreck, A Pretschner
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2087-2094, 2016
52016
Klassifikation von IT-Sicherheitsvorfällen
B Grobauer, KP Kossakowski, T Schreck
Datenschutz und Datensicherheit-DuD 40 (1), 17-21, 2016
42016
IT security incident response: Current state, emerging problems, and new approaches
T Schreck
PQDT-Global, 2018
32018
An nsis-based approach for firewall traversal in mobile ipv6 networks
N Steinleitner, X Fu, D Hogrefe, T Schreck, H Tschofenig
3rd International ICSTConference on Wireless Internet, 2010
32010
The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs
B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger, S CERT
Retrieved 12/1/2014 from FIRST. http://www. first. org/resources/papers …, 2014
22014
Department Informatik
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stuttgen, S Vomel, ...
2011
Analyse und Vergleich von BckR2D2-I und II Analysis and Comparison of BckR2D2-I and II
A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ...
2011
Analysis of Firewall Solutions in Mobile IPv6: Diplomarbeit an der Faklutät Informatik
T Schreck, P Hartmann
2007
Conference Organization IMF 2018
KP Kossakowski, H Morgenstern, H Baier, C Keil, J Cole, A Dewald, ...
The system can't perform the operation now. Try again later.
Articles 1–16