Cyberthreat hunting - Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules

Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

275 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Cyberthreat hunting - Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules'. Together they form a unique fingerprint.

Computer Science

INIS