Results 51 to 60 of about 5,200 (210)
This article presents the findings of exploratory research into the origins of OSINT for which it discusses three case studies from, respectively, the United States, Germany and the Netherlands. Many authors writing on open source intelligence assume that the first OSINT practices emerged at the eve of the Second World War with the establishment of the
openaire +2 more sources
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
Поняття OSINT у сфері публічного порядку та безпеки
У статті досліджено сутність та особливості поняття розвідки з відкритих джерел (OSINT) у сфері забезпечення публічного порядку та безпеки. Показано, що актуальність дослідження обумовлена зростанням кількості правопорушень, які залишають цифрові сліди ...
R. Y. Byba
doaj +1 more source
A nyílt forrásból származó adatgyűjtés automatizálásának lehetőségei
Cél: A digitális forradalom korát éljük, amelyben a korszerű technológiáknak és ezek dinamikusan növekvő felhasználói táborának köszönhetően eddig soha nem látott mennyiségű, szabadon hozzáférhető, részben nemzetbiztonsági szempontból fontos adat ...
Attila Gulyás
doaj +1 more source
Two theoretical dimensions of the cyber hate crime [PDF]
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core
Abstract The transition from one level of operations to a next larger, more complex level while maintaining coherence as a system has stymied organizational theorists for decades. Drawing on systems theory, network analysis, and collaborative governance, we explore how networks adapt during rapidly escalating crises.
Louise Comfort, Saemi Chang
wiley +1 more source
This study develops a novel software architecture for Open Source Intelligence (OSINT). The primary architectural drivers of the OSINT architecture are identified using the Quality Attribute Workshop (QAW), and an end-to-end OSINT software architecture ...
Gokhan Yurtalan, Serdar Arslan
doaj +1 more source
The evolving landscape of military geoscience demands the integration of advanced geospatial technologies to enhance situational awareness, decision‐making and operational efficiency in military operations. This article focuses on the critical role of geographical information systems, remote sensing, artificial intelligence and drones in modern warfare,
Ivan Henrico
wiley +1 more source
Відкрита розвідка (OSINT) у протидії інформаційним війнам: аналітичні інструменти та правові межі
Стаття присвячена комплексному дослідженню відкритої розвідки Open Source Intelligence – OSINT як одного з ключових інструментів протидії інформаційним війнам, дезінформаційним кампаніям та гібридним загрозам у сучасному цифровому середовищі ...
M. O. Dumchykov
doaj +1 more source

