... X [22] 2018 Detection, honey file, protection X [23] 2018 Detection, mitigation, Software Defined Networking (SDN) X [24] 2016 Detection mechanism X [25] 2017 Analysis and detection, simple Logic (SP), SVM X [26] 2017 Cryptoanalysis, detection X X [27] 2017 Deep learning, Long-short term memory (LSTM) X [28] 2017 Crypto model, encryption keys, proactive prevention X [29] 2018 Dynamic analysis, anomaly detection, SVM X [30] 2018 Backups, disaster recovery, risk assessment X [31] 2017 Deep networks, detection X [32] 2017 Recurrent neural network (RNN), detection X [33] 2018 Mitigation, detection X X [34] 2017 Ransomware evolution, safety measures X [35] 2018 Detection, mitigation, SDN, NFVs X [36] 2017 Crypto-Ransomware, bitcoin, Cybercurrency X [37] 2019 Static analysis, opcode, Machine learning X [38] 2018 Security, model checking, android X [39] 2018 Bitcoin, crypto-currency, payment X [40] 2018 Volatile memory forensics memory dumps X [41] 2019 Deep learning, convolutional neural network, LSTM X [42] 2018 Remote Desktop Protocol (RDP), detection X [43] 2018 Behavioral detection, anomaly X [44] 2018 Detection, deception systems X [45] 2018 Real time detection, access control, file operation X [46] 2018 Encryptor, file protection, document editing X [47] 2017 Cyber threats, security audit, penetration testing, IoT, privacy X Table 1 presents a summary of the different phases followed during an investigation. These are: the review of the state of the art, proposal, and testing. ...