Results 71 to 80 of about 4,943 (194)
Sosiaalisen median muodostama uhka taisteluosaston operaatioturvallisuudelle joukkojen perustamisvaiheessa [PDF]
Operaatioturvallisuus (OPTU) nykyajan konseptina on suhteellisen tuore. Aihetta on tutkittu Persianlahdensodan ajoilta asti. Suomen Puolustusvoimat tulkitsee operaatioturvallisuutta yleisesti ottaen samalla tavalla kuin Yhdysvaltojen asevoimat ...
Paloheimo, Aito
core
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich +19 more
core +1 more source
Зарубіжний досвід антитерористичного використання OSINT
До завдань правоохоронних органів входить підтримання правопорядку, захист громадян, запобігання, виявлення та розслідування злочинів. Одним з найважливіших аспектів успішної поліцейської роботи є здатність поліції отримувати своєчасну, достовірну і ...
O. E. Korystin, N. P. Svyrydiuk
doaj +1 more source
The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
The amount of data generated by the current interconnected world is immeasurable, and a large part of such data is publicly available, which means that it is accessible by any user, at any time, from anywhere in the Internet. In this respect, Open Source
Javier Pastor-Galindo +3 more
doaj +1 more source
An AI-based OSINT framework for fake news detection and economic impact assessment in cyber diplomacy [PDF]
The article outlines how the cyber diplomacy is becoming increasingly pertinent in light of the digital platforms' growing role in the political discourse, particularly in the aftermath of fake news becoming a significant challenge.
Adrian-Victor VEVERA +2 more
doaj +1 more source
Predictive Policing and the Automated Suppression of Dissent [PDF]
Following a special workshop convened by the Media Policy Project on ‘Automation, Prediction and Digital Inequalities’, Lina Dencik, Lecturer in the School of Media, Journalism and Cultural Studies at the University of Cardiff, reflects on some of the ...
Denick, Lina
core
Internet of Things Security and Forensics: Challenges and Opportunities
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for ...
Conti, Mauro +3 more
core +1 more source
Small businesses need vulnerability assessments to identify and mitigate cyber risks. Cybersecurity clinics provide a solution by offering students hands-on experience while delivering free vulnerability assessments to local organizations. To scale this model, we propose an Open Source Intelligence (OSINT) clinic where students conduct assessments ...
Anirban Mukhopadhyay, Kurt Luther
openaire +2 more sources
Hackers as terrorists? Why it doesn't compute [PDF]
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core +1 more source
Open Source Intelligence (OSINT): issues and trends
Open Source Intelligence (OSINT) is an intelligence product which has been processed, analysed and obtained from the publicly available information. It should be actionable and disseminated in a timely manner to the appropriate audience. Open source intelligence transfers specific knowledge to beneficiaries for them to use it in their actions and the ...
Ivanjko, Tomislav, Dokman, Tomislav
openaire +4 more sources

