The following publications are possibly variants of this publication:
- Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware TriagingNitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song. ssci 2019: 625-632 [doi]
- Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means ClusteringNitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang. fuzzIEEE 2019: 1-6 [doi]
- Fuzzy Hashing Aided Enhanced YARA Rules for Malware TriagingNitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song, Tossapon Boongoen, Natthakan Iam-on. ssci 2020: 1138-1145 [doi]
- Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and ClusteringNitin Naik, Paul Jenkins, Jonathan Gillett, Haralambos Mouratidis, Kshirasagar Naik, Jingping Song. ssci 2019: 641-648 [doi]
- Fuzzy-Import Hashing: A Malware Analysis ApproachNitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Tossapon Boongoen, Natthakan Iam-on. fuzzIEEE 2020: 1-8 [doi]