Mobile-sandbox: having a deeper look into android applications M Spreitzenbarth, F Freiling, F Echtler, T Schreck, J Hoffmann Proceedings of the 28th annual ACM symposium on applied computing, 1808-1815, 2013 | 432 | 2013 |
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques M Spreitzenbarth, T Schreck, F Echtler, D Arp, J Hoffmann International Journal of Information Security 14, 141-153, 2015 | 133 | 2015 |
Towards incident handling in the cloud: challenges and approaches B Grobauer, T Schreck Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 77-86, 2010 | 124 | 2010 |
Mining attributed graphs for threat intelligence H Gascon, B Grobauer, T Schreck, L Rist, D Arp, K Rieck Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 36 | 2017 |
BISSAM: Automatic vulnerability identification of office documents T Schreck, S Berger, J Göbel International conference on detection of intrusions and malware, and …, 2012 | 23 | 2012 |
Risk factors for ulcerative colitis-associated colorectal cancer: A retrospective cohort study EF de Campos Silva, JP Baima, JR de Barros, SE Tanni, T Schreck, ... Medicine 99 (32), 2020 | 18 | 2020 |
The MANTIS Framework: Cyber Threat Intelligence Management for CERTs B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger Boston, US, Jun, 2014 | 8 | 2014 |
Analyse und Vergleich von BckR2D2-I und II A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ... | 8 | 2011 |
MalFlow: identification of C&C servers through host-based data flow profiling T Wüchner, M Ochoa, M Golagha, G Srivastava, T Schreck, A Pretschner Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2087-2094, 2016 | 5 | 2016 |
Klassifikation von IT-Sicherheitsvorfällen B Grobauer, KP Kossakowski, T Schreck Datenschutz und Datensicherheit-DuD 40 (1), 17-21, 2016 | 5 | 2016 |
An nsis-based approach for firewall traversal in mobile ipv6 networks N Steinleitner, X Fu, D Hogrefe, T Schreck, H Tschofenig 3rd International ICSTConference on Wireless Internet, 2010 | 5 | 2010 |
Foreclosure discounts for German housing markets T Just, M Heinrich, MA Maurin, T Schreck International Journal of Housing Markets and Analysis 13 (2), 143-163, 2020 | 4 | 2020 |
Different clusters in patients with chronic obstructive pulmonary disease (Copd): a two-center study in brazil JW Zucchi, EAT Franco, T Schreck, MH Castro e Silva, SRS Migliorini, ... International Journal of chronic obstructive pulmonary disease, 2847-2856, 2020 | 3 | 2020 |
IT security incident response: Current state, emerging problems, and new approaches T Schreck PQDT-Global, 2018 | 3 | 2018 |
Auswirkungen von Solvency II auf die Immobilienanlagen europäischer Versicherer M Heinrich, T Just, T Schreck IREBS International Real Estate Business School, Universität Regensburg, 2015 | 2 | 2015 |
The MANTIS Framework Cyber-Threat Intelligence Mgmt. for CERTs B Grobauer, S Berger, J Göbel, T Schreck, J Wallinger, S CERT Retrieved 12/1/2014 from FIRST. http://www. first. org/resources/papers …, 2014 | 2 | 2014 |
The Interest Rate Sensitivity of Institutional Real Estate Investments M Heinrich, T Schreck LARES, 2018 | 1 | 2018 |
Effects of Solvency II on Portfolio Efficiency, The Case of Real Estate and Infrastructure Investments M Heinrich, T Schreck LARES, 2017 | 1 | 2017 |
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification C Ellerhold, J Schnagl, T Schreck Proceedings of the 2023 on Cloud Computing Security Workshop, 17-29, 2023 | | 2023 |
Sharing Communities: The Good, the Bad, and the Ugly T Geras, T Schreck Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |