Fig. 10From: Ransomware deployment methods and analysis: views from a predictive model and human responsesGraph showing the stages of deployment for TeslaCrypt, Cerber and WannaCry according to the states of the Randep modelBack to article page