Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily lives, more public information ...
Muhammad Mudassar Yamin +5 more
doaj +1 more source
Earth Observation for the Protection of Human Rights during the Armed Aggression [PDF]
Russia’s military aggression against Ukraine has raised a wide range of issues concerning the use of remote sensing data for the protection of human rights and freedoms during armed conflicts.
Ana Hurova
doaj +1 more source
The power of artificial intelligence for managing pandemics: A primer for public health professionals. [PDF]
Abstract Artificial intelligence (AI) applications are complex and rapidly evolving, and thus often poorly understood, but have potentially profound implications for public health. We offer a primer for public health professionals that explains some of the key concepts involved and examines how these applications might be used in the response to a ...
McKee M, Rosenbacke R, Stuckler D.
europepmc +2 more sources
Ontology population for open-source intelligence: A GATE-based solution [PDF]
Open-Source INTelligence is intelligence based on publicly available sources such as news sites, blogs, forums, etc. The Web is the primary source of information, but once data are crawled, they need to be interpreted and structured.
Ganino, Giulio +3 more
core +1 more source
Abstract War produces devastating impacts on humankind, especially in terms of lives and livelihoods. While war is a widely studied topic in history, it remains relatively understudied in business. To address this gap, this article explores the impact of war for business and society.
Weng Marc Lim +19 more
wiley +1 more source
Current Status and Security Trend of OSINT
Recently, users have used open‐source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack ...
Yong-Woon Hwang +5 more
wiley +1 more source
An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix
With the occurrence of cyber security incidents, the value of threat intelligence is coming to the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can quickly respond to threats. However, the sparse text in public threat intelligence scatters useful information, which makes it challenging to assess unstructured ...
Shuqin Zhang +7 more
wiley +1 more source
Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic.
Hatma Suryotrisongko +3 more
doaj +1 more source
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts [PDF]
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing,
Finch E. +6 more
core +1 more source
Military Information Leak Response Technology through OSINT Information Analysis Using SNSes
Open‐source intelligence (OSINT), an information gathering and analysis system that utilizes public information on SNSes, is a necessary information gathering activity to counter terrorism and cyberterrorism. Although it is not possible to patrol cyberspace directly, as in real space, cyberspace can be patrolled by collecting information using OSINT ...
Yong-Joon Lee +3 more
wiley +1 more source

