Cyberthreat hunting - Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
429
Downloads
(Pure)