“… Integrated Data Stream: The integration of data from diverse sources, such as network logs, user activity, and external threat feeds into a single platform, is being advocated [126]. This approach aims to provide a holistic view of the cyber environment.…”