Honeypot forensics part 1: analyzing the network | IEEE Journals & Magazine | IEEE Xplore