BibTeX records: Thomas Schreck

download as .bib file

@inproceedings{DBLP:conf/ccs/GerasS23,
  author       = {Thomas Geras and
                  Thomas Schreck},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Sharing Communities: The Good, the Bad, and the Ugly},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2755--2769},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623144},
  doi          = {10.1145/3576915.3623144},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GerasS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/EllerholdSS23,
  author       = {Christian Ellerhold and
                  Johann Schnagl and
                  Thomas Schreck},
  editor       = {Francesco Regazzoni and
                  Apostolos P. Fournaris},
  title        = {Enterprise Cyber Threat Modeling and Simulation of Loss Events for
                  Cyber Risk Quantification},
  booktitle    = {Proceedings of the 2023 on Cloud Computing Security Workshop, {CCSW}
                  2023, Copenhagen, Denmark, 26 November 2023},
  pages        = {17--29},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605763.3625244},
  doi          = {10.1145/3605763.3625244},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/EllerholdSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/HilbigSL23,
  author       = {Tobias Hilbig and
                  Thomas Schreck and
                  Tobias Limmer},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {'State of the Union': Evaluating Open Source Zero Trust Components},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_3},
  doi          = {10.1007/978-3-031-47198-8\_3},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/HilbigSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpec/DewesGS22,
  author       = {Tilman Dewes and
                  Tiago Gasiba and
                  Thomas Schreck},
  editor       = {Alberto Sim{\~{o}}es and
                  Jo{\~{a}}o Carlos Silva},
  title        = {Understanding the Usage of IT-Security Games in the Industry and Its
                  Mapping to Job Profiles},
  booktitle    = {Third International Computer Programming Education Conference, {ICPEC}
                  2022, June 2-3, 2022, Polytechnic Institute of C{\'{a}}vado and
                  Ave (IPCA), Barcelos, Portugal},
  series       = {OASIcs},
  volume       = {102},
  pages        = {3:1--3:12},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/OASIcs.ICPEC.2022.3},
  doi          = {10.4230/OASICS.ICPEC.2022.3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpec/DewesGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Schreck18,
  author       = {Thomas Schreck},
  title        = {{IT} Security Incident Response: Current State, Emerging Problems,
                  and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger
                  Stand, Probleme und neue Methodiken)},
  school       = {University of Erlangen-Nuremberg, Germany},
  year         = {2018},
  url          = {https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/9219},
  urn          = {urn:nbn:de:bvb:29-opus4-92194},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Schreck18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GasconGSRAR17,
  author       = {Hugo Gascon and
                  Bernd Grobauer and
                  Thomas Schreck and
                  Lukas Rist and
                  Daniel Arp and
                  Konrad Rieck},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Mining Attributed Graphs for Threat Intelligence},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029811},
  doi          = {10.1145/3029806.3029811},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GasconGSRAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/WuchnerOGSSP16,
  author       = {Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Mojdeh Golagha and
                  Gaurav Srivastava and
                  Thomas Schreck and
                  Alexander Pretschner},
  editor       = {Sascha Ossowski},
  title        = {MalFlow: identification of C{\&}C servers through host-based data
                  flow profiling},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {2087--2094},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851802},
  doi          = {10.1145/2851613.2851802},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/WuchnerOGSSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrobauerKS15,
  author       = {Bernd Grobauer and
                  Klaus{-}Peter Kossakowski and
                  Thomas Schreck},
  title        = {Klassifikation von IT-Sicherheitsvorf{\"{a}}llen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {1},
  pages        = {17--21},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11623-016-0536-7},
  doi          = {10.1007/S11623-016-0536-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrobauerKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SpreitzenbarthS15,
  author       = {Michael Spreitzenbarth and
                  Thomas Schreck and
                  Florian Echtler and
                  Daniel Arp and
                  Johannes Hoffmann},
  title        = {Mobile-Sandbox: combining static and dynamic analysis with machine-learning
                  techniques},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {141--153},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0250-0},
  doi          = {10.1007/S10207-014-0250-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SpreitzenbarthS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SpreitzenbarthFESH13,
  author       = {Michael Spreitzenbarth and
                  Felix C. Freiling and
                  Florian Echtler and
                  Thomas Schreck and
                  Johannes Hoffmann},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Mobile-sandbox: having a deeper look into android applications},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1808--1815},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480701},
  doi          = {10.1145/2480362.2480701},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SpreitzenbarthFESH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchreckBG12,
  author       = {Thomas Schreck and
                  Stefan Berger and
                  Jan G{\"{o}}bel},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {{BISSAM:} Automatic Vulnerability Identification of Office Documents},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {204--213},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_12},
  doi          = {10.1007/978-3-642-37300-8\_12},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchreckBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DewaldFSSSVW12,
  author       = {Andreas Dewald and
                  Felix C. Freiling and
                  Thomas Schreck and
                  Michael Spreitzenbarth and
                  Johannes St{\"{u}}ttgen and
                  Stefan V{\"{o}}mel and
                  Carsten Willems},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Analyse und Vergleich von BckR2D2-I und {II}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {47--58},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18287},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DewaldFSSSVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrobauerS10,
  author       = {Bernd Grobauer and
                  Thomas Schreck},
  editor       = {Adrian Perrig and
                  Radu Sion},
  title        = {Towards incident handling in the cloud: challenges and approaches},
  booktitle    = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2010, Chicago, IL, USA, October 8, 2010},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866835.1866850},
  doi          = {10.1145/1866835.1866850},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrobauerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wicon/SteinleitnerFHS07,
  author       = {Niklas Steinleitner and
                  Xiaoming Fu and
                  Dieter Hogrefe and
                  Thomas Schreck and
                  Hannes Tschofenig},
  editor       = {Lili Qiu and
                  Andr{\'{a}}s Gergely Valk{\'{o}}},
  title        = {An NSIS-based approach for firewall traversal in mobile IPv6 networks},
  booktitle    = {3rd International ICSTConference on Wireless Internet, {WICON} 2007,
                  Austin, TX, USA, October 22-24, 2007},
  pages        = {15},
  publisher    = {{ICST}},
  year         = {2007},
  url          = {https://doi.org/10.4108/wicon.2007.2091},
  doi          = {10.4108/WICON.2007.2091},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wicon/SteinleitnerFHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/SchreckC00,
  author       = {Thomas Schreck and
                  Zhengxin Chen},
  title        = {Branch grafting method for R-tree implementation},
  journal      = {J. Syst. Softw.},
  volume       = {53},
  number       = {1},
  pages        = {83--93},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0164-1212(00)00057-1},
  doi          = {10.1016/S0164-1212(00)00057-1},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/SchreckC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SchreckC00,
  author       = {Thomas Schreck and
                  Zhengxin Chen},
  editor       = {Barrett R. Bryant and
                  Janice H. Carroll and
                  Ernesto Damiani and
                  Hisham Haddad and
                  Dave Oppenheim},
  title        = {R-Tree Implementation Using Branch-Grafting Method},
  booktitle    = {Applied Computing 2000, Proceedings of the 2000 {ACM} Symposium on
                  Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March
                  19-21, 2000. Volume 1},
  pages        = {328--332},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335603.335784},
  doi          = {10.1145/335603.335784},
  timestamp    = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/SchreckC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/SchreckC97,
  author       = {Thomas Schreck and
                  Zhengxin Chen},
  title        = {Implementation of locking schemes in extended dependency graphs},
  journal      = {Inf. Softw. Technol.},
  volume       = {39},
  number       = {7},
  pages        = {477--483},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0950-5849(96)00003-1},
  doi          = {10.1016/S0950-5849(96)00003-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/SchreckC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics