1. Kostopoulos, G.K.: Cyberspace and Cybersecurity, Second. Taylor and Francis (2017)
2. FBI. 2018 Internet Crime Report. Federal Bureau of Investigation (2018)
3. Moore, C.: Detecting ransomware with honeypot techniques. In: 2016 Cybersecurity Cyberforensics Conference (CCC), pp. 77–81 (2016)
4. Wilding, E.: Popp goes the weasel. Virus Bull. 20 (1992)
5. Young, Y., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings of the IEEE Symposium Security Privacy, pp. 129–140 (1996)