Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

clustering techniques

biblio

Visible to the public Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering

Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
  • signature based defense
  • fuzzy techniques
  • Indexes
  • Locky
  • malicious code writing
  • Measurement
  • pattern clustering
  • privacy
  • pubcrawl
  • Ransomware
  • ransomware threat actor
  • SDHASH
  • fuzzy similarity scores
  • Similarity Preserving
  • SSDEEP
  • successful attack vectors
  • threat actors
  • threat vectors
  • Triaging
  • unknown ransomware
  • unlimited polymorphic samples
  • WannaCry
  • WannaCryptor
  • Writing
  • Cryptography
  • Resiliency
  • Metrics
  • Fuzzy Cryptography
  • Attack Surfaces
  • c-means clustering
  • Cerber
  • cluster ransomware samples
  • clustering methods
  • clustering techniques
  • composability
  • Context-Triggered Piecewise Hashing
  • Scalability
  • CryptoWall
  • CTPH
  • cyberthreat hunting
  • efficient fuzzy analysis approach
  • FCM
  • FCM clustering results
  • fuzzy c-means clustering
  • Fuzzy Hashing
  • fuzzy hashing methods
  • fuzzy set theory

Terms of Use  |  ©2023. CPS-VO