Young, A.; M. Yung (1996). 《Cryptovirology: extortion-based security threats and countermeasures》. IEEE Symposium on Security and Privacy. 129–140쪽. doi:10.1109/SECPRI.1996.502676. ISBN0-8186-7417-2.
Min, Donghyun; Ko, Yungwoo; Walker, Ryan; Lee, Junghee; Kim, Youngjae (July 2022). 《A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense》. 《IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems》 41. 2038–2051쪽. Bibcode:2022ITCAD..41.2038M. doi:10.1109/TCAD.2021.3099084. ISSN0278-0070. S2CID237683171.
Young, Adam (2006). 《Cryptoviral Extortion Using Microsoft's Crypto API: Can Crypto APIs Help the Enemy?》. 《International Journal of Information Security》 5. 67–76쪽. doi:10.1007/s10207-006-0082-7. S2CID12990192.
Al-Hawawreh, Muna; den Hartog, Frank; Sitnikova, Elena (2019). 《Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things》. 《IEEE Internet of Things Journal》 6. 7137–7151쪽. Bibcode:2019IITJ....6.7137A. doi:10.1109/JIOT.2019.2914390. S2CID155469264.
Beaman, Craig; Barkworth, Ashley; Akande, Toluwalope David; Hakak, Saqib; Khan, Muhammad Khurram (2021년 12월 1일). 《Ransomware: Recent advances, analysis, challenges and future research directions》. 《Computers & Security》 111. doi:10.1016/j.cose.2021.102490. ISSN0167-4048. PMC8463105. PMID34602684.지원되지 않는 변수 무시됨: |article-number= (도움말)
Min, Donghyun; Ko, Yungwoo; Walker, Ryan; Lee, Junghee; Kim, Youngjae (July 2022). 《A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense》. 《IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems》 41. 2038–2051쪽. Bibcode:2022ITCAD..41.2038M. doi:10.1109/TCAD.2021.3099084. ISSN0278-0070. S2CID237683171.
Al-Hawawreh, Muna; den Hartog, Frank; Sitnikova, Elena (2019). 《Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things》. 《IEEE Internet of Things Journal》 6. 7137–7151쪽. Bibcode:2019IITJ....6.7137A. doi:10.1109/JIOT.2019.2914390. S2CID155469264.
Young, Adam (2006). 《Cryptoviral Extortion Using Microsoft's Crypto API: Can Crypto APIs Help the Enemy?》. 《International Journal of Information Security》 5. 67–76쪽. doi:10.1007/s10207-006-0082-7. S2CID12990192.
Al-Hawawreh, Muna; den Hartog, Frank; Sitnikova, Elena (2019). 《Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things》. 《IEEE Internet of Things Journal》 6. 7137–7151쪽. Bibcode:2019IITJ....6.7137A. doi:10.1109/JIOT.2019.2914390. S2CID155469264.