Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Thorsten Holz
Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science