Honeypot forensics, part II: analyzing the compromised host | IEEE Journals & Magazine | IEEE Xplore