Results 51 to 60 of about 5,200 (210)

The long history of OSINT

open access: yesJournal of Intelligence History, 2023
This article presents the findings of exploratory research into the origins of OSINT for which it discusses three case studies from, respectively, the United States, Germany and the Netherlands. Many authors writing on open source intelligence assume that the first OSINT practices emerged at the eve of the Second World War with the establishment of the
openaire   +2 more sources

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, Volume 55, Issue 12, Page 1915-1930, December 2025.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

Поняття OSINT у сфері публічного порядку та безпеки

open access: yesНауковий вісник Ужгородського національного університету. Серія Право
У статті досліджено сутність та особливості поняття розвідки з відкритих джерел (OSINT) у сфері забезпечення публічного порядку та безпеки. Показано, що актуальність дослідження обумовлена зростанням кількості правопорушень, які залишають цифрові сліди ...
R. Y. Byba
doaj   +1 more source

A nyílt forrásból származó adatgyűjtés automatizálásának lehetőségei

open access: yesBelügyi Szemle, 2023
Cél: A digitális forradalom korát éljük, amelyben a korszerű technológiáknak és ezek dinamikusan növekvő felhasználói táborának köszönhetően eddig soha nem látott mennyiségű, szabadon hozzáférhető, részben nemzetbiztonsági szempontból fontos adat ...
Attila Gulyás
doaj   +1 more source

Two theoretical dimensions of the cyber hate crime [PDF]

open access: yes, 2017
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of
Salas, Cesar Rommel
core  

Transition in dynamic events: The 2020 lightning complex fires in Northern California as an adaptive system

open access: yesRisk Analysis, Volume 45, Issue 12, Page 4318-4331, December 2025.
Abstract The transition from one level of operations to a next larger, more complex level while maintaining coherence as a system has stymied organizational theorists for decades. Drawing on systems theory, network analysis, and collaborative governance, we explore how networks adapt during rapidly escalating crises.
Louise Comfort, Saemi Chang
wiley   +1 more source

Redefining OSINT Software Architecture With System-Centric Architecture Design: A Framework Shaped by QAW, ADD, and ATAM

open access: yesIEEE Access
This study develops a novel software architecture for Open Source Intelligence (OSINT). The primary architectural drivers of the OSINT architecture are identified using the Quality Attribute Workshop (QAW), and an end-to-end OSINT software architecture ...
Gokhan Yurtalan, Serdar Arslan
doaj   +1 more source

Modern approaches in military geoscience: leveraging advanced geospatial technologies for strategic advantage

open access: yesGeology Today, Volume 41, Issue 4, Page 166-175, July/August 2025.
The evolving landscape of military geoscience demands the integration of advanced geospatial technologies to enhance situational awareness, decision‐making and operational efficiency in military operations. This article focuses on the critical role of geographical information systems, remote sensing, artificial intelligence and drones in modern warfare,
Ivan Henrico
wiley   +1 more source

Відкрита розвідка (OSINT) у протидії інформаційним війнам: аналітичні інструменти та правові межі

open access: yesАналітично-порівняльне правознавство
Стаття присвячена комплексному дослідженню відкритої розвідки Open Source Intelligence – OSINT як одного з ключових інструментів протидії інформаційним війнам, дезінформаційним кампаніям та гібридним загрозам у сучасному цифровому середовищі ...
M. O. Dumchykov
doaj   +1 more source

Home - About - Disclaimer - Privacy