1. Ayoade G. Chandra S. Kahn L.et al. (2018).Threat report classification over multi‐source data. 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC) 236–245.IEEE.http://dx.doi.org/10.1109/CIC.2018.00040.
2. Biasini N.(2016).SamSam: the doctor will see you after he pays the ransom.Cisco Talos Threat Intelligence(23 March).https://blog.talosintelligence.com/2016/03/samsam‐ransomware.html(accessed 13 January 2023).
3. deBruijne M. vanEeten M. Hernández GañánC. andPieters W.(2017).Towards a new cyber threat actor typology. A hybrid method for the NCSC cyber security assessment. Faculty of Technology Policy and Management Delft University of Technology.https://repository.wodc.nl/bitstream/handle/20.500.12832/2299/2740_Volledige_Tekst_tcm28‐273243.pdf(accessed 13 January 2023).