Fig. 9From: Ransomware deployment methods and analysis: views from a predictive model and human responsesEncryption states of WannaCry RansomwareBack to article page