1. cert-ist: The Reveton ransomware (2013). Available:
https://www.cert-ist.com/public/en/SO_detail?code=201301_article
. Last accessed 04 Dec 2019
2. Symantec: ISTR (2016). Available:
https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf
. Last accessed 01 Dec 2019
3. Schaefer, E., Le-Khac, N-A., Scanlon M.: Integration of ether unpacker into ragpicker for plugin-based malware analysis and identification. In: 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017
4. Linke, A., Le-Khac, N-A.: Control flow change in assembly as a classifier in malware analysis. In: 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016.
https://doi.org/10.1109/ISDFS.2016.7473514
5. Pilkey, A.: Ransomware likely to continue exponential growth unless governments act, says f-secure labs (2017). Available:
https://www.f-secure.com/en_GB/web/press_gb/news/news-archive/-/journal_content/56/1075444/1992103?p_p_auth=TAbI9XWV&refererPlid=1769223
. Last accessed 25 June 2019