Send mail to Author

Einsatz hardwaregestützter Virtualisierungstechnologien in der Malwareanalyse und Angriffserkennung (Report)

Please indicate your contact information and select, which author you want to contact.



 
  _____     ______    _____     ______              ______  
 /  ___||  /_   _//  /  ___||  /_   _//   ____     /_   _// 
| // __     -| ||-  | // __     -| ||-   |    \\    -| ||-  
| \\_\ ||   _| ||_  | \\_\ ||   _| ||_   | [] ||    _| ||_  
 \____//   /_____//  \____//   /_____//  |  __//   /_____// 
  `---`    `-----`    `---`    `-----`   |_|`-`    `-----`  
                                         `-`                
 


Back to frontdoor view


$Rev: 13159 $