Results 41 to 50 of about 4,943 (194)

OPEN SOURCE INTELLIGENCE (OSINT) AS AN ELEMENT OF MILITARY RECON

open access: yesSecurity and Defence Quarterly, 2018
One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which
Agata ZIÓŁKOWSKA
doaj   +1 more source

Leveraging OSINT for Advanced Proactive Cybersecurity: Strategies and Solutions

open access: yesIEEE Access
The growing complexity of the digital environment has increased the need for proactive and intelligence-based approaches to cybersecurity. This study examines the role of open-source intelligence (OSINT) as a strategic tool in proactive cybersecurity ...
Zafrir Avrahami   +2 more
doaj   +1 more source

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

Поняття OSINT у сфері публічного порядку та безпеки

open access: yesНауковий вісник Ужгородського національного університету. Серія Право
У статті досліджено сутність та особливості поняття розвідки з відкритих джерел (OSINT) у сфері забезпечення публічного порядку та безпеки. Показано, що актуальність дослідження обумовлена зростанням кількості правопорушень, які залишають цифрові сліди ...
R. Y. Byba
doaj   +1 more source

Two theoretical dimensions of the cyber hate crime [PDF]

open access: yes, 2017
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core  

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, Volume 55, Issue 12, Page 1915-1930, December 2025.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

Відкрита розвідка (OSINT) у протидії інформаційним війнам: аналітичні інструменти та правові межі

open access: yesАналітично-порівняльне правознавство
Стаття присвячена комплексному дослідженню відкритої розвідки Open Source Intelligence – OSINT як одного з ключових інструментів протидії інформаційним війнам, дезінформаційним кампаніям та гібридним загрозам у сучасному цифровому середовищі ...
M. O. Dumchykov
doaj   +1 more source

Undermining:social engineering using open source intelligence gathering [PDF]

open access: yes, 2012
Digital deposits are undergoing exponential growth. These may in turn be exploited to support cyber security initiatives through open source intelligence gathering.
Ball, Leslie   +2 more
core   +3 more sources

Transition in dynamic events: The 2020 lightning complex fires in Northern California as an adaptive system

open access: yesRisk Analysis, Volume 45, Issue 12, Page 4318-4331, December 2025.
Abstract The transition from one level of operations to a next larger, more complex level while maintaining coherence as a system has stymied organizational theorists for decades. Drawing on systems theory, network analysis, and collaborative governance, we explore how networks adapt during rapidly escalating crises.
Louise Comfort, Saemi Chang
wiley   +1 more source

Redefining OSINT Software Architecture With System-Centric Architecture Design: A Framework Shaped by QAW, ADD, and ATAM

open access: yesIEEE Access
This study develops a novel software architecture for Open Source Intelligence (OSINT). The primary architectural drivers of the OSINT architecture are identified using the Quality Attribute Workshop (QAW), and an end-to-end OSINT software architecture ...
Gokhan Yurtalan, Serdar Arslan
doaj   +1 more source

Home - About - Disclaimer - Privacy