Login / Signup
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Nitin Naik
Paul Jenkins
Nick Savage
Longzhi Yang
Published in:
FUZZ-IEEE (2019)
Keyphrases
</>
hash functions
order preserving
rule generation
hashing algorithm
data structure
fuzzy logic
rule extraction
nearest neighbor search
file organization
membership functions
fuzzy clustering
random projections
video copy detection
approximate nearest neighbor search
fuzzy numbers
similarity search
decision trees
fuzzy sets
hash tables
association rule mining
decision rules
t norm
hashing methods
fuzzy rules
fuzzy association rules
neural network
rule selection
fuzzy if then rules
hamming distance
case study
locality sensitive
production rules