1. Abrams, L. (2016a). Teslacrypt decrypted: Flaw in teslacrypt allows victim’s to recover their files.
https://www.bleepingcomputer.com/news/security/teslacrypt-decrypted-flaw-in-teslacrypt-allows-victims-to-recover-their-files/
. Accessed: 2018-6-26.
2. Abrams, L. (2016b). The cerber ransomware not only encrypts your data but also speaks to you. Retrieved June 26, 2018, from
https://www.bleepingcomputer.com/news/security/the-cerber-ransomware-not-only-encrypts-your-data-but-also-speaks-to-you/
.
3. Andronio, N., Zanero, S. & Maggi, F. (2015). Heldroid: Dissecting and detecting mobile ransomware. In: International Workshop on Recent Advances in Intrusion Detection, Springer, pp. 382–404.
4. Azmoodeh, A., Dehghantanha, A., Conti, M., & Choo, K. K. R. (2017). Detecting crypto-ransomware in iot networks based on energy consumption footprint. Journal of Ambient Intelligence and Humanized Computing, 23, 1–12.
5. Balazs, Z. (2016). Malware analysis sandbox testing methodology. Le Journal de la Cybercriminalité et des Investigations Numériques 1.