Thomas Schreck

Orcid: 0000-0002-8960-6986

According to our database1, Thomas Schreck authored at least 23 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Introduction to the IMF 2024 Special Issue.
DTRAP, 2024

A-WAYF: Automated Where Are You From in Multilateral Federations.
Proceedings of the 2nd International Workshop on Trends in Digital Identity (TDI 2024), 2024

Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
security.txt Revisited: Analysis of Prevalence and Conformity in 2022.
DTRAP, 2023

Introduction to the IMF 2023 Special Issue.
DTRAP, 2023

'State of the Union': Evaluating Open Source Zero Trust Components.
Proceedings of the Security and Trust Management - 19th International Workshop, 2023

Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

Sharing Communities: The Good, the Bad, and the Ugly.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles.
Proceedings of the Third International Computer Programming Education Conference, 2022

2018
IT Security Incident Response: Current State, Emerging Problems, and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger Stand, Probleme und neue Methodiken)
PhD thesis, 2018

2017
Mining Attributed Graphs for Threat Intelligence.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
MalFlow: identification of C&C servers through host-based data flow profiling.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques.
Int. J. Inf. Sec., 2015

Klassifikation von IT-Sicherheitsvorfällen.
Datenschutz und Datensicherheit, 2015

2013
Mobile-sandbox: having a deeper look into android applications.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

2012
Analyse und Vergleich von BckR2D2-I und II.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

BISSAM: Automatic Vulnerability Identification of Office Documents.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2010
Towards incident handling in the cloud: challenges and approaches.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2007
An NSIS-based approach for firewall traversal in mobile IPv6 networks.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

2000
Branch grafting method for R-tree implementation.
J. Syst. Softw., 2000

R-Tree Implementation Using Branch-Grafting Method.
Proceedings of the Applied Computing 2000, 2000

1997
Implementation of locking schemes in extended dependency graphs.
Inf. Softw. Technol., 1997


  Loading...