Showing 1 - 20 results of 20 for search '"Open-sources intelligence"', query time: 0.09s Refine Results
  1. 1

    Research on intelligence fusion: a holistic analysis of open-source intelligence fusion from the perspective of confrontation by YUAN Weilin, ZHAO Weiwei, HU Zhenzhen, CAO Wei, HE Jun, DONG Shaojin, WANG Chengyuan, WANG Shengqing

    Published 2024-09-01
    Subjects: “…open-source intelligence fusion;intelligence spoofing attack;intelligence anti-spoofing defense;deepfake;public opinion detection…”
    Get full text
    Article
  2. 2
  3. 3

    Wings of war: how open-source intelligence reveals the impact of warfare in Ukraine amid global avian biodiversity decline by Ewa Węgrzyn, Konrad Leniowski, Ivan Rusev, Iryna Miedviedieva, Natalia Tańska, Alexander A. Kagalo

    Published 2025-12-01
    “…Here, we use Open Source Intelligence (OSINT) to investigate the situation of avifauna in war-affected areas of Ukraine. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri by Ali Eksim, Mustafa Kara

    Published 2019-01-01
    Subjects: “…open source intelligence…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Alat OSINT Berbasis Web untuk Deteksi URL Phishing Menggunakan Integrasi API by Alfian Syahli, Rezki Kurniati, Nurmi Hidayasari

    Published 2025-08-01
    “…Penelitian ini menawarkan solusi berupa alat Open Source Intelligence (OSINT) berbasis web yang dibangun menggunakan framework Laravel dan bahasa pemrograman PHP. …”
    Get full text
    Article
  11. 11

    Screens as Battlefields: Fact-Checkers’ Multidimensional Challenges in Debunking Russian-Ukrainian War Propaganda by Laurence Dierickx, Carl-Gustav Lindén

    Published 2024-09-01
    “…The findings highlight the impact of socio-professional contexts on investigative methods, ranging from traditional journalism to advanced open-source intelligence methods. The study underscores the importance of international cooperation and support networks in addressing these challenges and also in mitigating the impact that exposure to violent content and harassment has on well-being and professional integrity.…”
    Get full text
    Article
  12. 12

    Prayer Disrupted by Preoccupations About Making a Donation. Payment Innovations in the Church in Poland by Janina Kotlińska, Grzegorz Kotliński

    Published 2024-11-01
    “…The study employed the methods of the critical analysis of literature and OSINT (Open Source Intelligence). …”
    Get full text
    Article
  13. 13

    Redefining OSINT Software Architecture With System-Centric Architecture Design: A Framework Shaped by QAW, ADD, and ATAM by Gokhan Yurtalan, Serdar Arslan

    Published 2025-01-01
    “…This study develops a novel software architecture for Open Source Intelligence (OSINT). The primary architectural drivers of the OSINT architecture are identified using the Quality Attribute Workshop (QAW), and an end-to-end OSINT software architecture design is implemented in accordance with Attribute-Driven Design (ADD). …”
    Get full text
    Article
  14. 14

    AMENINȚĂRILE FIMI ÎN PERSPECTIVA VIITOARELOR ALEGERI PARLAMENTARE DIN REPUBLICA MOLDOVA DIN 2025: O ABORDARE PROBABILISTICĂ BAZATĂ PE INFERENÞA BAYESIANÃÃRILE FIMI ÎN PERSPECTIVA V... by ȚÎBRIGAN, NICOLAE

    Published 2025-03-01
    “…By integrating the Open Source Intelligence (OSINT) data, governmental reports, and academic studies, five plausible scenarios were evaluated: (1) intensification of AI-driven disinformation campaigns, (2) exploitation of security fears to shape public perception, (3) financing and infiltration of pro-Russian political parties, (4) advanced disinformation campaigns aimed at undermining European integration, and (5) artificial mobilization of protests and public destabilization. …”
    Get full text
    Article
  15. 15

    The denying threat to national security and defense: Hezbollah’s presence in Colombia by David Andres Londoño-Bedoya, Maritza Padilla-Bueno, Jose Andres Areiza-Padilla, Ivan Veas-González

    Published 2025-12-01
    “…It focuses on Hezbollah’s involvement in drug trafficking, money laundering, and arms smuggling, highlighting the group’s integration into local criminal networks and its potential to destabilize regional security. Drawing on open-source intelligence, official documents, and peer-reviewed literature, the research reveals that Colombian defense policies have largely failed to recognize Hezbollah as a significant threat. …”
    Get full text
    Article
  16. 16

    Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT by N. N. Romanova, V. V. Gryzunov

    Published 2024-10-01
    “…The amount of personal data in open sources increases, which makes it possible for third parties to access it using open source intelligence (OSINT) methods, which can be used for malicious purposes. …”
    Get full text
    Article
  17. 17

    UDAWA Gadadar: Agent-based Cyber-physical System for Universal Small-scale Horticulture Greenhouse Management System by I Wayan Aditya Suranata, Ketut Elly Sutrisni, I Made Surya Adi Putra

    Published 2025-06-01
    “…This study proposes an open-source intelligent system platform called UDAWA (Universal Digital Agriculture Workflow Assistant) to assist small-scale farmers in digitizing greenhouse management processes. …”
    Get full text
    Article
  18. 18

    International legal standards for documentation and investigation of war crimes by Mykhailo Loshytskyi, Oleksandr Yunin, Dmytro Kyslenko, Bohdana Tychna, Oleksandr Dotsenko

    Published 2025-06-01
    “…An analysis of 25 digital platforms showed that 32% focus on evidence preservation, 28% on Open source intelligence (OSINT) analysis, 20% on archiving, and 20% on legal support and international coordination. …”
    Get full text
    Article
  19. 19

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…Also, it raises the question of how hackers can create a profile of an individual starting from one data leak and getting more details on individuals with the help of Open Source Intelligence (OSINT). Furthermore, there is a dilemma in utilizing data breach datasets dumped on the clear web or the dark web because of the sensitive nature of the information. …”
    Get full text
    Article
  20. 20

    Infrastructure-based sensor fusion for acquiring gross vehicle weight rating classifications by Guoliang Feng, Yiqiao Li, Andre Y.C. Tok, Stephen G. Ritchie

    Published 2025-07-01
    “…To address this challenge, this paper developed an approach to acquire GVWR-based classification data through the aggregation of two complementary infrastructure-based sensing technologies: inductive loop sensors and side-fire cameras. An open-source intelligence (OSINT) method was initially adopted to establish a GVWR-based vehicle dictionary to overcome mapping challenges with classes that cannot be directly associated with singular GVWR-based classes. …”
    Get full text
    Article