While handling an incident, either in the identification phase or during the computer forensics analysis, it is necessary to analyze the logs from different servers to identify the events that could be related to the incident. This task is often done using regular expressions with a customized list...