Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thomas Schreck
@inproceedings{DBLP:conf/ccs/GerasS23, author = {Thomas Geras and Thomas Schreck}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Sharing Communities: The Good, the Bad, and the Ugly}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2755--2769}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623144}, doi = {10.1145/3576915.3623144}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GerasS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/EllerholdSS23, author = {Christian Ellerhold and Johann Schnagl and Thomas Schreck}, editor = {Francesco Regazzoni and Apostolos P. Fournaris}, title = {Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification}, booktitle = {Proceedings of the 2023 on Cloud Computing Security Workshop, {CCSW} 2023, Copenhagen, Denmark, 26 November 2023}, pages = {17--29}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605763.3625244}, doi = {10.1145/3605763.3625244}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccsw-ws/EllerholdSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/HilbigSL23, author = {Tobias Hilbig and Thomas Schreck and Tobias Limmer}, editor = {Ruben Rios and Joachim Posegga}, title = {'State of the Union': Evaluating Open Source Zero Trust Components}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {42--61}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_3}, doi = {10.1007/978-3-031-47198-8\_3}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/HilbigSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpec/DewesGS22, author = {Tilman Dewes and Tiago Gasiba and Thomas Schreck}, editor = {Alberto Sim{\~{o}}es and Jo{\~{a}}o Carlos Silva}, title = {Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles}, booktitle = {Third International Computer Programming Education Conference, {ICPEC} 2022, June 2-3, 2022, Polytechnic Institute of C{\'{a}}vado and Ave (IPCA), Barcelos, Portugal}, series = {OASIcs}, volume = {102}, pages = {3:1--3:12}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/OASIcs.ICPEC.2022.3}, doi = {10.4230/OASICS.ICPEC.2022.3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpec/DewesGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Schreck18, author = {Thomas Schreck}, title = {{IT} Security Incident Response: Current State, Emerging Problems, and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger Stand, Probleme und neue Methodiken)}, school = {University of Erlangen-Nuremberg, Germany}, year = {2018}, url = {https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/9219}, urn = {urn:nbn:de:bvb:29-opus4-92194}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Schreck18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GasconGSRAR17, author = {Hugo Gascon and Bernd Grobauer and Thomas Schreck and Lukas Rist and Daniel Arp and Konrad Rieck}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Mining Attributed Graphs for Threat Intelligence}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {15--22}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029811}, doi = {10.1145/3029806.3029811}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GasconGSRAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/WuchnerOGSSP16, author = {Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Mojdeh Golagha and Gaurav Srivastava and Thomas Schreck and Alexander Pretschner}, editor = {Sascha Ossowski}, title = {MalFlow: identification of C{\&}C servers through host-based data flow profiling}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {2087--2094}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851802}, doi = {10.1145/2851613.2851802}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/WuchnerOGSSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrobauerKS15, author = {Bernd Grobauer and Klaus{-}Peter Kossakowski and Thomas Schreck}, title = {Klassifikation von IT-Sicherheitsvorf{\"{a}}llen}, journal = {Datenschutz und Datensicherheit}, volume = {40}, number = {1}, pages = {17--21}, year = {2015}, url = {https://doi.org/10.1007/s11623-016-0536-7}, doi = {10.1007/S11623-016-0536-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrobauerKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SpreitzenbarthS15, author = {Michael Spreitzenbarth and Thomas Schreck and Florian Echtler and Daniel Arp and Johannes Hoffmann}, title = {Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {141--153}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0250-0}, doi = {10.1007/S10207-014-0250-0}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SpreitzenbarthS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SpreitzenbarthFESH13, author = {Michael Spreitzenbarth and Felix C. Freiling and Florian Echtler and Thomas Schreck and Johannes Hoffmann}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Mobile-sandbox: having a deeper look into android applications}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1808--1815}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480701}, doi = {10.1145/2480362.2480701}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/SpreitzenbarthFESH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchreckBG12, author = {Thomas Schreck and Stefan Berger and Jan G{\"{o}}bel}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {{BISSAM:} Automatic Vulnerability Identification of Office Documents}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {204--213}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_12}, doi = {10.1007/978-3-642-37300-8\_12}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchreckBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DewaldFSSSVW12, author = {Andreas Dewald and Felix C. Freiling and Thomas Schreck and Michael Spreitzenbarth and Johannes St{\"{u}}ttgen and Stefan V{\"{o}}mel and Carsten Willems}, editor = {Neeraj Suri and Michael Waidner}, title = {Analyse und Vergleich von BckR2D2-I und {II}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {47--58}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18287}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DewaldFSSSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrobauerS10, author = {Bernd Grobauer and Thomas Schreck}, editor = {Adrian Perrig and Radu Sion}, title = {Towards incident handling in the cloud: challenges and approaches}, booktitle = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW} 2010, Chicago, IL, USA, October 8, 2010}, pages = {77--86}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866835.1866850}, doi = {10.1145/1866835.1866850}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrobauerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicon/SteinleitnerFHS07, author = {Niklas Steinleitner and Xiaoming Fu and Dieter Hogrefe and Thomas Schreck and Hannes Tschofenig}, editor = {Lili Qiu and Andr{\'{a}}s Gergely Valk{\'{o}}}, title = {An NSIS-based approach for firewall traversal in mobile IPv6 networks}, booktitle = {3rd International ICSTConference on Wireless Internet, {WICON} 2007, Austin, TX, USA, October 22-24, 2007}, pages = {15}, publisher = {{ICST}}, year = {2007}, url = {https://doi.org/10.4108/wicon.2007.2091}, doi = {10.4108/WICON.2007.2091}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wicon/SteinleitnerFHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SchreckC00, author = {Thomas Schreck and Zhengxin Chen}, title = {Branch grafting method for R-tree implementation}, journal = {J. Syst. Softw.}, volume = {53}, number = {1}, pages = {83--93}, year = {2000}, url = {https://doi.org/10.1016/S0164-1212(00)00057-1}, doi = {10.1016/S0164-1212(00)00057-1}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/SchreckC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SchreckC00, author = {Thomas Schreck and Zhengxin Chen}, editor = {Barrett R. Bryant and Janice H. Carroll and Ernesto Damiani and Hisham Haddad and Dave Oppenheim}, title = {R-Tree Implementation Using Branch-Grafting Method}, booktitle = {Applied Computing 2000, Proceedings of the 2000 {ACM} Symposium on Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19-21, 2000. Volume 1}, pages = {328--332}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335603.335784}, doi = {10.1145/335603.335784}, timestamp = {Tue, 06 Nov 2018 11:06:45 +0100}, biburl = {https://dblp.org/rec/conf/sac/SchreckC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/SchreckC97, author = {Thomas Schreck and Zhengxin Chen}, title = {Implementation of locking schemes in extended dependency graphs}, journal = {Inf. Softw. Technol.}, volume = {39}, number = {7}, pages = {477--483}, year = {1997}, url = {https://doi.org/10.1016/S0950-5849(96)00003-1}, doi = {10.1016/S0950-5849(96)00003-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/SchreckC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.