Results 21 to 30 of about 1,187,761 (284)

Undermining:social engineering using open source intelligence gathering [PDF]

open access: yes, 2012
Digital deposits are undergoing exponential growth. These may in turn be exploited to support cyber security initiatives through open source intelligence gathering.
Ball, Leslie   +2 more
core   +3 more sources

Investigating an open methodology for designing domain-specific language collections [PDF]

open access: yes, 2014
With this research and design paper, we are proposing that Open Educational Resources (OERs) and Open Access (OA) publications give increasing access to high quality online educational and research content for the development of powerful domain-specific ...
Barge, Martin   +2 more
core   +2 more sources

Automatic classification of social media reports on violent incidents in South Africa using machine learning

open access: yesSouth African Journal of Science, 2020
With the growing amount of data available in the digital age, it has become increasingly important to use automated methods to extract useful information from data.
Eduan Kotzé   +2 more
doaj   +1 more source

Surveillance and falsification implications for open source intelligence investigations [PDF]

open access: yes, 2015
© 2015 ACM. Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement ...
Babak Akhgar   +8 more
core   +1 more source

Open-source intelligence and privacy by design [PDF]

open access: yesComputer Law & Security Review, 2013
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience of the
Koops, B.J., Hoepman, J.H., Leenes, R.
openaire   +4 more sources

OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON

open access: yesSecurity and Defence Quarterly, 2018
One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which
Agata ZIÓŁKOWSKA
doaj   +1 more source

The rise of open-source intelligence

open access: yesEuropean Journal of International Security
This article challenges the perception of Open-Source Intelligence (OSINT) as a revolutionary shift driven by the explosion of publicly accessible data. Instead, we argue that the rise of OSINT reflects an evolution of traditional intelligence practices:
Damien Van Puyvelde   +1 more
doaj   +1 more source

Universal Reinforcement Learning Algorithms: Survey and Experiments [PDF]

open access: yes, 2017
Many state-of-the-art reinforcement learning (RL) algorithms typically assume that the environment is an ergodic Markov Decision Process (MDP). In contrast, the field of universal reinforcement learning (URL) is concerned with algorithms that make as few
Aslanides, John   +2 more
core   +1 more source

Discretizing Continuous Action Space for On-Policy Optimization

open access: yes, 2020
In this work, we show that discretizing action space for continuous control is a simple yet powerful technique for on-policy optimization. The explosion in the number of discrete actions can be efficiently addressed by a policy with factorized ...
Agrawal, Shipra, Tang, Yunhao
core   +1 more source

Probabilistic Graphical Models on Multi-Core CPUs using Java 8 [PDF]

open access: yes, 2016
In this paper, we discuss software design issues related to the development of parallel computational intelligence algorithms on multi-core CPUs, using the new Java 8 functional programming features.
Borchani, Hanen   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy