Results 111 to 120 of about 5,200 (210)
OSINT – Gondolatok a kérdéskörhöz
The OSINT as a branch of intelligence has been extensively researched nowadays, and its application is present in the sphere of both economic and government organisations responsible for security. It has many application advantages and limitations, and the technological environment has a significant impact on the development of OSINT.
openaire +1 more source
Advancing the cybersecurity of the healthcare system with self-optimising and self-adaptative artificial intelligence (part 2). [PDF]
Radanliev P, De Roure D.
europepmc +2 more sources
The relevance of the research topic is due to unprecedented sanctions pressure on Russian business and the improvement of sanctions policy tools by Western countries, namely the EU and the United States.
Dmitriy A. Medvedev, Anastasia E. Malykh
doaj +1 more source
The potential of open source information in supporting Acquisition Pathway Analysis to design IAEA State Level Approaches [PDF]
International Atomic Energy Agency (IAEA) safeguards designed to deter nuclear proliferation are constantly evolving to respond to new challenges. Within its State Level Concept, the IAEA envisions an objective-based and information-driven approach for ...
COJAZZI Giacomo +5 more
core
Use of digital data from open sources during the investigation of criminal offenses: certain aspects
he purpose of the article is to study the possibilities of using digital data from open sources during the investigation of criminal offenses. Methodology.
Basysta I. +3 more
doaj +1 more source
Does the Intelligence Cycle Still Exist [PDF]
The author of this study has been dealing with this topic for several years. He raises the following right questions: does the intelligence cycle still exist, how did the intelligence cycle develop and change, what are the real elements of this cycle ...
Vida, Csaba
core
Using Statistical Methods to Determine Geolocation Via Twitter [PDF]
With the ever expanding usage of social media websites such as Twitter, it is possible to use statistical inquires to form a geographic location of a person using solely the content of their tweets.
Wright, Christopher M.
core +1 more source
Cybersecurity vulnerability analysis of medical devices purchased by national health services. [PDF]
Bracciale L, Loreti P, Bianchi G.
europepmc +1 more source
Objective. The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes.
N. N. Romanova, V. V. Gryzunov
doaj +1 more source
DEVELOPMENT OF THE SECURITY ENVIRONMENT: A CONCEPTUAL OSINT MODEL AND MANAGEMENT FRAMEWORK
The main purpose of this study is to develop theoretical and conceptual provisions that reveal the essence and mechanisms of security environment development, as well as the role of OSINT and management in this process.
Василь Франчук +4 more
doaj +1 more source

