2018

  1. IT Security Incident Response: Current State, Emerging Problems, and New Approaches Schreck, Thomas 2018

2017

  1. Mining Attributed Graphs for Threat Intelligence Gascon, Hugo, Grobauer, Bernd, Schreck, Thomas, Rist, Lukas, Arp, Daniel, and Rieck, Konrad In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017 2017

2016

  1. MalFlow: identification of C&C servers through host-based data flow profiling Wüchner, Tobias, Ochoa, Martı́n, Golagha, Mojdeh, Srivastava, Gaurav, Schreck, Thomas, and Pretschner, Alexander In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016 2016

2015

  1. Klassifikation von IT-Sicherheitsvorfällen Grobauer, Bernd, Kossakowski, Klaus-Peter, and Schreck, Thomas Datenschutz und Datensicherheit 2015

2014

  1. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques Spreitzenbarth, Michael, Schreck, Thomas, Echtler, Florian, Arp, Daniel, and Hoffmann, Johannes International Journal of Information Security 2014

2013

  1. MobileSandbox: Ein Analyseframework für Android Applikationen Spreitzenbarth, Michael, Echtler, Florian, Schreck, Thomas, Hoffmann, Johannes, and Lemoine, Hanno In Proceedings of the 13th Deutscher IT-Sicherheitskongress (13. Deutscher IT-Sicherheitskongress Bonn) 2013
  2. Mobile-sandbox: having a deeper look into android applications Spreitzenbarth, Michael, Freiling, Felix, Echtler, Florian, Schreck, Thomas, and Hoffmann, Johannes In Proceedings of the 28th Annual ACM Symposium on Applied Computing 2013
  3. BISSAM: Automatic vulnerability identification of office documents Schreck, Thomas, Berger, Stefan, and Göbel, Jan 2013

2012

  1. Linux Speicheranalyse Grundlagen und neue Techniken Schreck, Thomas, Schulik, Peter, and Göbel, Jan 2012
  2. Analyse und Vergleich von BckR2D2-I und II Dewald, Andreas, Freiling, Felix, Schreck, Thomas, Spreitzenbarth, Michael, Stüttgen, Johannes, Vömel, Stefan, and Willems, Carsten In Proceedings of GI Sicherheit 2012 2012

2011

  1. Analyse und Vergleich von BckR2D2-I und II Dewald, Andreas, Freiling, Felix, Schreck, Thomas, Spreitzenbarth, Michael, Stüttgen, Johannes, Vömel, Stefan, and Willems, Carsten 2011

2010

  1. Towards incident handling in the cloud: challenges and approaches Grobauer, Bernd, and Schreck, Thomas In Proceedings of the 2010 ACM workshop on Cloud computing security workshop 2010

2007

  1. An NSIS-based approach for firewall traversal in mobile IPv6 networks Steinleitner, Niklas, Fu, Xiaoming, Hogrefe, Dieter, Schreck, Thomas, and Tschofenig, Hannes In Proceedings of the 3rd international conference on Wireless internet 2007
  2. Diploma Thesis: Analysis of Firewall Solutions in Mobile IPv6 Schreck, Thomas 2007