Results 71 to 80 of about 4,943 (194)

Sosiaalisen median muodostama uhka taisteluosaston operaatioturvallisuudelle joukkojen perustamisvaiheessa [PDF]

open access: yes, 2014
Operaatioturvallisuus (OPTU) nykyajan konseptina on suhteellisen tuore. Aihetta on tutkittu Persianlahdensodan ajoilta asti. Suomen Puolustusvoimat tulkitsee operaatioturvallisuutta yleisesti ottaen samalla tavalla kuin Yhdysvaltojen asevoimat ...
Paloheimo, Aito
core  

Practical Attacks Against Graph-based Clustering

open access: yes, 2017
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich   +19 more
core   +1 more source

Зарубіжний досвід антитерористичного використання OSINT

open access: yesНауковий вісник Ужгородського національного університету. Серія Право
До завдань правоохоронних органів входить підтримання правопорядку, захист громадян, запобігання, виявлення та розслідування злочинів. Одним з найважливіших аспектів успішної поліцейської роботи є здатність поліції отримувати своєчасну, достовірну і ...
O. E. Korystin, N. P. Svyrydiuk
doaj   +1 more source

The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends

open access: yesIEEE Access, 2020
The amount of data generated by the current interconnected world is immeasurable, and a large part of such data is publicly available, which means that it is accessible by any user, at any time, from anywhere in the Internet. In this respect, Open Source
Javier Pastor-Galindo   +3 more
doaj   +1 more source

An AI-based OSINT framework for fake news detection and economic impact assessment in cyber diplomacy [PDF]

open access: yesRevista Română de Informatică și Automatică
The article outlines how the cyber diplomacy is becoming increasingly pertinent in light of the digital platforms' growing role in the political discourse, particularly in the aftermath of fake news becoming a significant challenge.
Adrian-Victor VEVERA   +2 more
doaj   +1 more source

Predictive Policing and the Automated Suppression of Dissent [PDF]

open access: yes, 2016
Following a special workshop convened by the Media Policy Project on ‘Automation, Prediction and Digital Inequalities’, Lina Dencik, Lecturer in the School of Media, Journalism and Cultural Studies at the University of Cardiff, reflects on some of the ...
Denick, Lina
core  

Internet of Things Security and Forensics: Challenges and Opportunities

open access: yes, 2018
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for ...
Conti, Mauro   +3 more
core   +1 more source

OSINT Clinic: Co-designing AI-Augmented Collaborative OSINT Investigations for Vulnerability Assessment

open access: yesProceedings of the 2025 CHI Conference on Human Factors in Computing Systems
Small businesses need vulnerability assessments to identify and mitigate cyber risks. Cybersecurity clinics provide a solution by offering students hands-on experience while delivering free vulnerability assessments to local organizations. To scale this model, we propose an Open Source Intelligence (OSINT) clinic where students conduct assessments ...
Anirban Mukhopadhyay, Kurt Luther
openaire   +2 more sources

Hackers as terrorists? Why it doesn't compute [PDF]

open access: yes, 2003
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core   +1 more source

Open Source Intelligence (OSINT): issues and trends

open access: yesInternational Conference The Future of Information Sciences INFuture, 2020
Open Source Intelligence (OSINT) is an intelligence product which has been processed, analysed and obtained from the publicly available information. It should be actionable and disseminated in a timely manner to the appropriate audience. Open source intelligence transfers specific knowledge to beneficiaries for them to use it in their actions and the ...
Ivanjko, Tomislav, Dokman, Tomislav
openaire   +4 more sources

Home - About - Disclaimer - Privacy