Research Article

Analysis of Challenges in Modern Network Forensic Framework

Figure 5

Flow of process of attack graph-based forensic technique.