Results 41 to 50 of about 4,943 (194)
OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON
One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which
Agata ZIÓŁKOWSKA
doaj +1 more source
Leveraging OSINT for Advanced Proactive Cybersecurity: Strategies and Solutions
The growing complexity of the digital environment has increased the need for proactive and intelligence-based approaches to cybersecurity. This study examines the role of open-source intelligence (OSINT) as a strategic tool in proactive cybersecurity ...
Zafrir Avrahami +2 more
doaj +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
Поняття OSINT у сфері публічного порядку та безпеки
У статті досліджено сутність та особливості поняття розвідки з відкритих джерел (OSINT) у сфері забезпечення публічного порядку та безпеки. Показано, що актуальність дослідження обумовлена зростанням кількості правопорушень, які залишають цифрові сліди ...
R. Y. Byba
doaj +1 more source
Two theoretical dimensions of the cyber hate crime [PDF]
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
Відкрита розвідка (OSINT) у протидії інформаційним війнам: аналітичні інструменти та правові межі
Стаття присвячена комплексному дослідженню відкритої розвідки Open Source Intelligence – OSINT як одного з ключових інструментів протидії інформаційним війнам, дезінформаційним кампаніям та гібридним загрозам у сучасному цифровому середовищі ...
M. O. Dumchykov
doaj +1 more source
Undermining:social engineering using open source intelligence gathering [PDF]
Digital deposits are undergoing exponential growth. These may in turn be exploited to support cyber security initiatives through open source intelligence gathering.
Ball, Leslie +2 more
core +3 more sources
Abstract The transition from one level of operations to a next larger, more complex level while maintaining coherence as a system has stymied organizational theorists for decades. Drawing on systems theory, network analysis, and collaborative governance, we explore how networks adapt during rapidly escalating crises.
Louise Comfort, Saemi Chang
wiley +1 more source
This study develops a novel software architecture for Open Source Intelligence (OSINT). The primary architectural drivers of the OSINT architecture are identified using the Quality Attribute Workshop (QAW), and an end-to-end OSINT software architecture ...
Gokhan Yurtalan, Serdar Arslan
doaj +1 more source

