Thomas Schreck

Orcid: 0000-0002-8960-6986

According to our database1, Thomas Schreck authored at least 17 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
'State of the Union': Evaluating Open Source Zero Trust Components.
Proceedings of the Security and Trust Management - 19th International Workshop, 2023

Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

Sharing Communities: The Good, the Bad, and the Ugly.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles.
Proceedings of the Third International Computer Programming Education Conference, 2022

2018
IT Security Incident Response: Current State, Emerging Problems, and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger Stand, Probleme und neue Methodiken)
PhD thesis, 2018

2017
Mining Attributed Graphs for Threat Intelligence.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
MalFlow: identification of C&C servers through host-based data flow profiling.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques.
Int. J. Inf. Sec., 2015

Klassifikation von IT-Sicherheitsvorfällen.
Datenschutz und Datensicherheit, 2015

2013
Mobile-sandbox: having a deeper look into android applications.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

2012
Analyse und Vergleich von BckR2D2-I und II.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

BISSAM: Automatic Vulnerability Identification of Office Documents.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2010
Towards incident handling in the cloud: challenges and approaches.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2007
An NSIS-based approach for firewall traversal in mobile IPv6 networks.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

2000
Branch grafting method for R-tree implementation.
J. Syst. Softw., 2000

R-Tree Implementation Using Branch-Grafting Method.
Proceedings of the Applied Computing 2000, 2000

1997
Implementation of locking schemes in extended dependency graphs.
Inf. Softw. Technol., 1997


  Loading...