Modeling the network forensics behaviors | IEEE Conference Publication | IEEE Xplore