Keeping Track of Network Infrastructure Vulnerabilities Using a Network Forensic Approach | IEEE Conference Publication | IEEE Xplore