On the inadequacy of open-source application logs for digital forensics