Fig. 7From: Ransomware deployment methods and analysis: views from a predictive model and human responsesCerber Ransomware start and end times of Windows API function calls within the encryption state of the Randep modelBack to article page