Fig. 6From: Ransomware deployment methods and analysis: views from a predictive model and human responsesCerber Ransomware start and end times of states of Randep model showing a the full-view and b the start, zoomed-inBack to article page