1. McIntosh, T., Kayes, A., Chen, Y.-P.P., Ng, A., Watters, P.: Ransomware mitigation in the modern era: a comprehensive review, research challenges, and future directions. ACM Comput. Surv. (CSUR) 54(9), 1–36 (2021)
2. IBM Security, The definitive guide to ransomware: Readiness, response, and remediation. IBM Security. https://www.ibm.com/downloads/cas/EV6NAQR4. Accessed 12 Feb 2020
3. Barak, I.: How Does Ransomware Work?. https://www.cybereason.com/blog/how-does-ransomware-work#:~:text=Ransomware%20is%20a%20type%20of,ransom%20payment%20to%20restore%20access. Accessed 25 Sep 2017
4. Lecture Notes in Computer Science;A Kharraz,2015
5. Van der Walt, C., Collard, A., Grimes, R.A., Pillay, K.: Defending Against Ransomware - An Advisory by the South African Cybersecurity Hub. www.orangecyberdefense.com/za/contact/. Accessed 10 May 2021