1. (2018) Scikit-learn: machine learning in python. http://scikit-learn.org/stable/. Accessed Feb 2020
2. (2018) Weka 3: data mining software in java. https://www.cs.waikato.ac.nz/ml/weka/. Accessed July 2019
3. (2018) The onion ransomware (encryption trojan). https://www.kaspersky.co.in/resource-center/threats/onion-ransomware-virus-threat. Accessed Oct 2018
4. Abadi M, Agarwal A, Barham P, KullBrevdo E, Chen Z, Citro C, Corrado GS, Davis A, Dean J, Devin M, et al. (2016) Tensorflow: large-scale machine learning on heterogeneous distributed systems. arXiv:160304467
5. Andrews R, Geva S (1995) Inserting and extracting knowledge from constrained error back propagation networks. In: Proceedings of the 6th Australian conference on neural networks, Sydney, NSW, Australia, pp 213–216