Research Article

Next-Generation Digital Forensic Readiness BYOD Framework

Figure 6

Malicious traffic captured from architecture of Figure 4, index 23 from Palo Alto as per design.