Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Context-Triggered Piecewise Hashing
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
signature based defense
fuzzy techniques
Indexes
Locky
malicious code writing
Measurement
pattern clustering
privacy
pubcrawl
Ransomware
ransomware threat actor
SDHASH
fuzzy similarity scores
Similarity Preserving
SSDEEP
successful attack vectors
threat actors
threat vectors
Triaging
unknown ransomware
unlimited polymorphic samples
WannaCry
WannaCryptor
Writing
Cryptography
Resiliency
Metrics
Fuzzy Cryptography
Attack Surfaces
c-means clustering
Cerber
cluster ransomware samples
clustering methods
clustering techniques
composability
Context-Triggered Piecewise Hashing
Scalability
CryptoWall
CTPH
cyberthreat hunting
efficient fuzzy analysis approach
FCM
FCM clustering results
fuzzy c-means clustering
Fuzzy Hashing
fuzzy hashing methods
fuzzy set theory