1. Implement network security control solutions in BYOD environment
2. Iosif Androulidakis and Gorazd Kandus . 2011 . Mobile phone security awareness and practices of students in budapest . In Proceedings of the 6th International Conference on Digital Telecommunications. 17–22 . Iosif Androulidakis and Gorazd Kandus. 2011. Mobile phone security awareness and practices of students in budapest. In Proceedings of the 6th International Conference on Digital Telecommunications. 17–22.
3. Emma Bell , Alan Bryman , and Bill Harley . 2022. Business research methods . Oxford university press . Emma Bell, Alan Bryman, and Bill Harley. 2022. Business research methods. Oxford university press.
4. Beyond Identity Blog . 2021 . BYOD: Exploring the evolution of work device practices in a new remote-forward era [survey]. https://www.beyondidentity.com/blog/byod-exploring-evolution-work-device-practices-survey Beyond Identity Blog. 2021. BYOD: Exploring the evolution of work device practices in a new remote-forward era [survey]. https://www.beyondidentity.com/blog/byod-exploring-evolution-work-device-practices-survey
5. EKnad: Exploit Kits’ network activity detection