Application of the SAMA methodology to Ryuk malware | Publicación