1. Young, A. L., & Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of ransomware. Communications of the ACM, 60(7), 24–26.
2. Mercaldo, F., Nardone, V., & Santone, A. (2016, August). Ransomware inside out. In 2016 11th International Conference on Availability, Reliability and Security (ARES) (pp. 628–637). IEEE.
3. Unit 42 Palo Alto Networks Threat Report—Ransomware: Unlocking the Lucrative Criminal Business Model (2016, May). Retrieved June 21, 2017. https://www.paloaltonetworks.com/resources/research/ransomware-report .
4. Deloitte Threat Intelligence and Analytics Report (2016). Retrieved June 21, 2017. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-aers-ransomware.pdf .
5. Symantec Security Response Whitepaper. The evolution of ransomware (2015, August). Retrieved June 19, 2017. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf .