Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation | IEEE Conference Publication | IEEE Xplore