Skip to main navigation Skip to search Skip to main content

Cyberthreat hunting - Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules

Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

429 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Cyberthreat hunting - Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules'. Together they form a unique fingerprint.
Sort by

INIS

Computer Science