1. Varonis: A brief history of ransomware (2016)
https://www.varonis.com/blog/a-brief-history-of-ransomware/
2. Young, A., Yung, M.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140, May 1996
3. Arsene, L., Gheorghe, A.: Ransomware, a victims perspective (2016).
http://www.bitdefender.com/media/materials/white-papers/en/Bitdefender_Ransomware_A_Victim_Perspective.pdf
4. Dunn, J.E.: Sophoslabs (2018).
https://nakedsecurity.sophos.com/2018/11/14/targeted-ransomware-attacks-sophoslabs-2019-threat-report/
5. Cartwright, E., Hernandez Castro, J., Cartwright, A.: To pay or not: game theoretic models of ransomware. J. Cybersecur. 5(1) (2019).
https://doi.org/10.1093/cybsec/tyz009