Forensic Search for Traces of Unauthorized Access Using the Kerberos Authentication Protocol | IEEE Conference Publication | IEEE Xplore