Fig. 10
From: Ransomware deployment methods and analysis: views from a predictive model and human responses

Graph showing the stages of deployment for TeslaCrypt, Cerber and WannaCry according to the states of the Randep model
From: Ransomware deployment methods and analysis: views from a predictive model and human responses

Graph showing the stages of deployment for TeslaCrypt, Cerber and WannaCry according to the states of the Randep model