Results 31 to 40 of about 1,662,564 (322)
OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations [PDF]
Open Source Intelligence (OSINT) investigations, which rely entirely on publicly available data such as social media, play an increasingly important role in solving crimes and holding governments accountable. The growing volume of data and complex nature
Anirban Mukhopadhyay +2 more
semanticscholar +1 more source
Surveillance and falsification implications for open source intelligence investigations [PDF]
© 2015 ACM. Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement ...
Babak Akhgar +8 more
core +1 more source
The Open Source movement has established over the last decade a new collaborative approach, uniquely adapted to the Internet, to developing high-quality informational products. Initially, its exclusive application was the development of software (GNU/Linux and Apache are among the most prominent projects), but increasingly we can observe this ...
Stalder, Felix, Hirsh, Jesse
openaire +2 more sources
Investigating an open methodology for designing domain-specific language collections [PDF]
With this research and design paper, we are proposing that Open Educational Resources (OERs) and Open Access (OA) publications give increasing access to high quality online educational and research content for the development of powerful domain-specific ...
Barge, Martin +2 more
core +2 more sources
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts [PDF]
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing,
Finch E. +6 more
core +1 more source
OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON
One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which
Agata ZIÓŁKOWSKA
doaj +1 more source
Probabilistic Graphical Models on Multi-Core CPUs using Java 8 [PDF]
In this paper, we discuss software design issues related to the development of parallel computational intelligence algorithms on multi-core CPUs, using the new Java 8 functional programming features.
Borchani, Hanen +2 more
core +2 more sources
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam +2 more
core +1 more source
This paper presents a systematic review to identify research combining artificial intelligence (AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently, there is a lack of compilation of these approaches in the research
Thomas Oakley Browne +2 more
semanticscholar +1 more source
Discretizing Continuous Action Space for On-Policy Optimization
In this work, we show that discretizing action space for continuous control is a simple yet powerful technique for on-policy optimization. The explosion in the number of discrete actions can be efficiently addressed by a policy with factorized ...
Agrawal, Shipra, Tang, Yunhao
core +1 more source

