Results 31 to 40 of about 1,662,564 (322)

OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations [PDF]

open access: yesProc. ACM Hum. Comput. Interact.
Open Source Intelligence (OSINT) investigations, which rely entirely on publicly available data such as social media, play an increasingly important role in solving crimes and holding governments accountable. The growing volume of data and complex nature
Anirban Mukhopadhyay   +2 more
semanticscholar   +1 more source

Surveillance and falsification implications for open source intelligence investigations [PDF]

open access: yes, 2015
© 2015 ACM. Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement ...
Babak Akhgar   +8 more
core   +1 more source

Open Source Intelligence

open access: yesFirst Monday, 2002
The Open Source movement has established over the last decade a new collaborative approach, uniquely adapted to the Internet, to developing high-quality informational products. Initially, its exclusive application was the development of software (GNU/Linux and Apache are among the most prominent projects), but increasingly we can observe this ...
Stalder, Felix, Hirsh, Jesse
openaire   +2 more sources

Investigating an open methodology for designing domain-specific language collections [PDF]

open access: yes, 2014
With this research and design paper, we are proposing that Open Educational Resources (OERs) and Open Access (OA) publications give increasing access to high quality online educational and research content for the development of powerful domain-specific ...
Barge, Martin   +2 more
core   +2 more sources

Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts [PDF]

open access: yes, 2014
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing,
Finch E.   +6 more
core   +1 more source

OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON

open access: yesSecurity and Defence Quarterly, 2018
One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which
Agata ZIÓŁKOWSKA
doaj   +1 more source

Probabilistic Graphical Models on Multi-Core CPUs using Java 8 [PDF]

open access: yes, 2016
In this paper, we discuss software design issues related to the development of parallel computational intelligence algorithms on multi-core CPUs, using the new Java 8 functional programming features.
Borchani, Hanen   +2 more
core   +2 more sources

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

open access: yes, 2018
Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development.
Joshi, Anupam   +2 more
core   +1 more source

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

open access: yesInternational Journal of Information Security
This paper presents a systematic review to identify research combining artificial intelligence (AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently, there is a lack of compilation of these approaches in the research
Thomas Oakley Browne   +2 more
semanticscholar   +1 more source

Discretizing Continuous Action Space for On-Policy Optimization

open access: yes, 2020
In this work, we show that discretizing action space for continuous control is a simple yet powerful technique for on-policy optimization. The explosion in the number of discrete actions can be efficiently addressed by a policy with factorized ...
Agrawal, Shipra, Tang, Yunhao
core   +1 more source

Home - About - Disclaimer - Privacy