Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model | IEEE Conference Publication | IEEE Xplore