An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix
With the occurrence of cyber security incidents, the value of threat intelligence is coming to the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can quickly respond to threats. However, the sparse text in public threat intelligence scatters useful information, which makes it challenging to assess unstructured ...
Shuqin Zhang +7 more
wiley +1 more source
Military Information Leak Response Technology through OSINT Information Analysis Using SNSes
Open‐source intelligence (OSINT), an information gathering and analysis system that utilizes public information on SNSes, is a necessary information gathering activity to counter terrorism and cyberterrorism. Although it is not possible to patrol cyberspace directly, as in real space, cyberspace can be patrolled by collecting information using OSINT ...
Yong-Joon Lee +3 more
wiley +1 more source
Emotional Reactions to the Perception of Risk in the Pompeii Archaeological Park [PDF]
The assessment of perceived risk by people is extremely important for safety and security management. Each person is based on the opinion of others to make a choice and the Internet represents the place where these opinions are mostly researched, found ...
B. Russo, Simona +5 more
core +2 more sources
The amount of information produced by today's digital age is immense, and a major amount of it is available publicly, meaning that anybody can access it at any time, from anywhere on the Internet. In this way, Open-Source Intelligence (OSINT) is a branch of intelligence that gathers, analyses, and combines information from multiple sources across the ...
null Vinay Kumar Kureel +4 more
openaire +1 more source
The insider on the outside: a novel system for the detection of information leakers in social networks [PDF]
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers.
Cascavilla, Giuseppe +3 more
core +1 more source
Earth Observation for the Protection of Human Rights during the Armed Aggression [PDF]
Russia’s military aggression against Ukraine has raised a wide range of issues concerning the use of remote sensing data for the protection of human rights and freedoms during armed conflicts.
Ana Hurova
doaj +1 more source
Surveillance and falsification implications for open source intelligence investigations [PDF]
© 2015 ACM. Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement ...
Babak Akhgar +8 more
core +1 more source
Open source intelligence (OSINT) in a colombian context and sentiment analysis
Open source intelligence (OSINT) is used to obtain and analyze information related to adversaries, so it can support risk assessments aimed to prevent damages against critical assets.
Martin Jose Hernandez Mediná +4 more
doaj +1 more source
Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic.
Hatma Suryotrisongko +3 more
doaj +1 more source
OSINT-ТЕХНОЛОГІЇ ЯК ЗАГРОЗА КІБЕРБЕЗПЕЦI ДЕРЖАВИ
У статті досліджено OSINT-технології, як один із ключових викликів для національної безпеки України. З розвитком цифрового простору методи збору, аналізу та використання інформації з відкритих джерел набули широкого поширення, зокрема у сфері ...
Валерія Івкова +1 more
doaj +1 more source

