IT Security Incident Response: Current State, Emerging Problems, and New Approaches. Thomas Schreck. Doctoral Thesis, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2018. [ bib ]
 
Mining Attributed Graphs for Threat Intelligence. Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, and Konrad Rieck. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pages 15--22, 2017. [ bib | DOI | http ]
 
MalFlow: identification of C&C servers through host-based data flow profiling. Tobias Wüchner, Martín Ochoa, Mojdeh Golagha, Gaurav Srivastava, Thomas Schreck, and Alexander Pretschner. In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016, pages 2087--2094, 2016. [ bib | DOI | http ]
 
Klassifikation von IT-Sicherheitsvorfällen. Bernd Grobauer, Klaus-Peter Kossakowski, and Thomas Schreck. Datenschutz und Datensicherheit, 40(1):17--21, 2015. [ bib | DOI | http ]
 
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Daniel Arp, and Johannes Hoffmann. International Journal of Information Security, pages 1--13, 2014. [ bib ]
 
MobileSandbox: Ein Analyseframework für Android Applikationen. Michael Spreitzenbarth, Florian Echtler, Thomas Schreck, Johannes Hoffmann, and Hanno Lemoine. In Proceedings of the 13th Deutscher IT-Sicherheitskongress (13. Deutscher IT-Sicherheitskongress Bonn). BSI, 2013. [ bib ]
 
Mobile-sandbox: having a deeper look into android applications. Michael Spreitzenbarth, Felix Freiling, Florian Echtler, Thomas Schreck, and Johannes Hoffmann. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, pages 1808--1815. ACM, 2013. [ bib ]
 
BISSAM: Automatic vulnerability identification of office documents. Thomas Schreck, Stefan Berger, and Jan Göbel. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 204--213. Springer, 2013. [ bib ]
 
Linux Speicheranalyse Grundlagen und neue Techniken. Thomas Schreck, Peter Schulik, and Jan Göbel. In 19. DFN Workshop IT-Sicherheit in vernetzten Systemen. DFN-CERT, 2012. [ bib ]
 
Analyse und Vergleich von BckR2D2-I und II. Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, and Carsten Willems. In GI, editor, Proceedings of GI Sicherheit 2012, pages 0--0, 2012. [ bib ]
 
Analyse und Vergleich von BckR2D2-I und II. Andreas Dewald, Felix Freiling, Thomas Schreck, Michael Spreitzenbarth, Johannes Stüttgen, Stefan Vömel, and Carsten Willems. Technical report, 2011. [ bib | http ]
 
Towards incident handling in the cloud: challenges and approaches. Bernd Grobauer and Thomas Schreck. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages 77--86. ACM, 2010. [ bib ]
 
An NSIS-based approach for firewall traversal in mobile IPv6 networks. Niklas Steinleitner, Xiaoming Fu, Dieter Hogrefe, Thomas Schreck, and Hannes Tschofenig. In Proceedings of the 3rd international conference on Wireless internet, page 15. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2007. [ bib ]
 
Diploma Thesis: Analysis of Firewall Solutions in Mobile IPv6. Thomas Schreck. Technical report, 2007. [ bib ]