Counter hack: Creating a context for a cyber forensics course | IEEE Conference Publication | IEEE Xplore