Algorithms for searching and analysing information from open sources in the context of cyber threats
The article presented the development of an algorithm for searching and analysing information from open sources in the context of cyber threats. The proposed algorithm is an effective tool for detecting, monitoring, assessing and neutralising threats in ...
O. Onyshchuk, L. Hlynchuk
doaj +1 more source
The Projected Al Qaeda Use of Body Cavity Suicide Bombs Against High Value Targets [PDF]
This work is initially derived from a non-public disclosure series of early warning presentations, first delivered in September 2006, by the author on the projected terrorist use of body cavity suicide bombs against high value targets.
Bunker, Robert J.
core +2 more sources
Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine
In most open-source intelligence (OSINT) research efforts, the collection of information is performed in an entirely passive manner as an observer to third-party communication streams.
Elliott Rheault +6 more
doaj +1 more source
International Outsourcing's Role in International Technology Diffusion - The Irish Case [PDF]
This paper analyses how international outsourcing affects plant productivity, with the major contribution lying in the identification of heterogeneous effects for firms with differing internationalisation status.
Fergal McCann
core
Cybersecurity vulnerability analysis of medical devices purchased by national health services. [PDF]
Bracciale L, Loreti P, Bianchi G.
europepmc +1 more source
У статті досліджуються актуальні проблеми, пов’язані з використанням інформації з відкритих джерел під час розслідування злочинів, скоєних в умовах міжнародного збройного конфлікту, зокрема в контексті воєнної агресії Російської Федерації проти України,
B. S. Kosokhatko
doaj +1 more source
Оцінка результатів OSINT у судовій практиці: окремі питання
У статті розглянуто питання оцінки результатів OSINT у судовій практиці за критеріями належності, допустимості, достовірності. Звернено увагу на те, що є випадки оспорювання належності та допустимості таких доказів, а також їх достовірності.
I.V. Hloviuk
doaj +1 more source
Super-forecasting the 'technological singularity' risks from artificial intelligence. [PDF]
Radanliev P, De Roure D, Maple C, Ani U.
europepmc +1 more source
AI-Assisted OSINT/SOCMINT for Safeguarding Borders: A Systematic Review
In the highly volatile realm of global security, the necessity for leading-edge and effectual border resilience tactics has never been more imperative.
Alexandros Karakikes, Konstantinos Kotis
doaj +1 more source
Coronavirus fake news detection via MedOSINT check in health care official bulletins with CBR explanation: The way to find the real information source through OSINT, the verifier tool for official journals. [PDF]
Martinez Monterrubio SM +3 more
europepmc +1 more source

