Research Article

Next-Generation Digital Forensic Readiness BYOD Framework

Figure 8

(a) Phishing attack analysis packet captured. (b) The detailed cyber threat landscape in BYOD environment.
(a)
(b)