V, L., Raj M, K., C, N. and S, L. (2025) “A Practical Framework for Simulating and Investigating Multi-stage Cyber Intrusions through Log Correlation”, Journal of Cyber Security, Privacy Issues and Challenges, 4(3), pp. 33–39. Available at: https://matjournals.net/engineering/index.php/JCSPIC/article/view/2878 (Accessed: 16 April 2026).