Fig. 4From: Ransomware deployment methods and analysis: views from a predictive model and human responsesTeslaCrypt propagation of states start and end times, showing a original and b the revised versionBack to article page