Our Research

Explore our latest publications and academic contributers

CybersecurityNovember 29, 2025Nigel Sahl

Leveraging the MITRE ATT&CK Framework for Developing an Automated SOC

In an increasingly complex threat landscape, cybersecurity operations are often siloed, with threat intelligence and compliance management operating as separate disciplines. This paper proposes a...

CybersecurityKnowledge GraphThreat IntelligenceComplianceMITRE ATT&CKSecurity ControlsNeo4jGraph Database
*Conference on information Security and Cryptography Winter 2025
CybersecurityNovember 29, 2025Nigel Sahl

Leveraging the MITRE ATT&CK Framework for Developing an Automated SOC

In an increasingly complex threat landscape, cybersecurity operations are often siloed, with threat intelligence and compliance management operating as separate disciplines. This paper proposes a...

CybersecurityKnowledge GraphThreat IntelligenceComplianceMITRE ATT&CKSecurity ControlsNeo4jGraph Database
*Conference on information Security and Cryptography Winter 2025
CybersecurityNovember 29, 2025Nigel Sahl

Leveraging the MITRE ATT&CK Framework for Developing an Automated SOC

In an increasingly complex threat landscape, cybersecurity operations are often siloed, with threat intelligence and compliance management operating as separate disciplines. This paper proposes a...

CybersecurityKnowledge GraphThreat IntelligenceComplianceMITRE ATT&CKSecurity ControlsNeo4jGraph Database
*Conference on information Security and Cryptography Winter 2025