4.6 Review

Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Unfolding AIS Transmission Behavior for Vessel Movement Modeling on Noisy Data Leveraging Machine Learning

Gabriel Spadon et al.

Summary: This paper aims to model the AIS message transmission behavior through neural networks for forecasting upcoming AIS messages' content from multiple vessels. Deep learning models have shown a good ability to preserve vessels' spatial awareness regardless of temporal irregularity. The model achieved promising results in predicting vessel routes when analyzing multiple vessels of diverging types under temporally noise data.

IEEE ACCESS (2023)

Article Geochemistry & Geophysics

An Enhanced SiamMask Network for Coastal Ship Tracking

Xi Yang et al.

Summary: Coastal ship tracking is important for cargo transportation and route determination. Existing ship tracking methods lack accuracy due to the lack of contour and edge information, as well as scale variation and seawater-induced ship movements. Therefore, we propose an enhanced SiamMask network that combines visual object tracking and semisupervised object segmentation to address these challenges. Experimental results demonstrate that our method outperforms most state-of-the-art trackers.

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2022)

Article Psychology

Adolescent Involvement in Cybergossip: Influence on Social Adjustment, Bullying and Cyberbullying

Cristina Maria Garcia-Fernandez et al.

Summary: This study investigated the relationship between involvement in cybergossip and social adjustment, bullying, and cyberbullying among secondary school students. The results showed a high prevalence of involvement in cybergossip, which was associated with bullying and cyberbullying behavior. Girls showed the greatest involvement in cybergossip. The discussion highlighted the importance of addressing gender differences and providing training on proper use of digital devices for social education.

SPANISH JOURNAL OF PSYCHOLOGY (2022)

Article Computer Science, Artificial Intelligence

Coordinated inauthentic behavior and information spreading on Twitter

Matteo Cinelli et al.

Summary: This study explores the effects of coordinated users in information spreading on Twitter. The findings show that coordinated accounts tend to occupy higher positions in the information cascade, spread messages faster, and involve a slightly higher number of users. The study also introduces new measures to characterize the activity of coordinated accounts.

DECISION SUPPORT SYSTEMS (2022)

Article Criminology & Penology

An Assessment of Hitmen and Contracted Violence Providers Operating Online

Ariel L. Roddy et al.

Summary: Past research has explored the adaptation and risk management of vendors and consumers of illicit goods in online environments. However, this study focuses on contract-based violence and examines how vendors signal legitimacy and mitigate risk for consumers through language and images in their advertisements. The findings suggest that vendors emphasize privacy, anonymity, and affiliations with well-known organizations to establish trust and alleviate uncertainties.

DEVIANT BEHAVIOR (2022)

Article Chemistry, Analytical

Internet of Things: Evolution, Concerns and Security Challenges

Parushi Malhotra et al.

Summary: The rapid growth of IoT has unlocked the vision of a smart world but also raised significant security concerns. The research focuses on intrusion detection systems, analyzes various threats, discusses healthcare applications and security issues in IoT, and addresses research challenges for dealing with anomalies effectively.

SENSORS (2021)

Article Engineering, Electrical & Electronic

A Robust Deep Affinity Network for Multiple Ship Tracking

Wen Zhang et al.

Summary: The article introduces a robust deep affinity network (RoDAN) for Multiple Ship Tracking (MST), which improves performance in scale, region, and motion aspects. Experimental results demonstrate the superiority of this method in ship tracking, achieving holistic preferable performance over state-of-the-art methods.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2021)

Article Engineering, Electrical & Electronic

SiamFPN: A Deep Learning Method for Accurate and Real-Time Maritime Ship Tracking

Yunxiao Shan et al.

Summary: This paper proposed a deep learning-based tracking method, SiamFPN, which combines a modified Siamese Network with multiple RPNs to build a tracking pipeline, achieving high accuracy and real-time speed.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2021)

Article Computer Science, Artificial Intelligence

Sentiment analysis with deep neural networks: comparative study and performance assessment

Ramesh Wadawadagi et al.

ARTIFICIAL INTELLIGENCE REVIEW (2020)

Article Green & Sustainable Science & Technology

Computational System to Classify Cyber Crime Offenses using Machine Learning

Rupa Ch et al.

SUSTAINABILITY (2020)

Article Chemistry, Multidisciplinary

E-mail-Based Phishing Attack Taxonomy

Justinas Rastenis et al.

APPLIED SCIENCES-BASEL (2020)

Article Computer Science, Artificial Intelligence

A survey on secure communication techniques for 5G wireless heterogeneous networks

Ajay Kakkar

INFORMATION FUSION (2020)

Proceedings Paper Computer Science, Artificial Intelligence

IoT Based Smart Luggage Monitor Alarm System

Sowmya Valluripally et al.

4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence

Masashi Kadoguchi et al.

2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Contextual Lexicon Based Sentiment Analysis in Myanmar Text Reviews

Yu Mon Aye et al.

PROCEEDINGS OF 2020 23RD CONFERENCE OF THE ORIENTAL COCOSDA INTERNATIONAL COMMITTEE FOR THE CO-ORDINATION AND STANDARDISATION OF SPEECH DATABASES AND ASSESSMENT TECHNIQUES (ORIENTAL-COCOSDA 2020) (2020)

Article Chemistry, Multidisciplinary

Open-Source Intelligence Educational Resources: A Visual Perspective Analysis

Jhon Francined Herrera-Cubides et al.

APPLIED SCIENCES-BASEL (2020)

Review Computer Science, Information Systems

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

Rana Alabdan

FUTURE INTERNET (2020)

Article Computer Science, Information Systems

Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach

Saiba Nazah et al.

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

A Framework to Predict Social Crime through Twitter Tweets By Using Machine Learning

Zaheer Abbass et al.

2020 IEEE 14TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2020) (2020)

Article Criminology & Penology

SELLING DRUGS ON DARKWEB CRYPTOMARKETS: DIFFERENTIATED PATHWAYS, RISKS AND REWARDS

James Martin et al.

BRITISH JOURNAL OF CRIMINOLOGY (2020)

Article Criminology & Penology

Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition

Sebastian Wachs et al.

CRIMINAL BEHAVIOUR AND MENTAL HEALTH (2019)

Proceedings Paper Computer Science, Artificial Intelligence

A Sentiment analysis-based hotel recommendation using TF-IDF Approach

Ram Krishn Mishra et al.

PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

The challenge of detecting sophisticated attacks: Insights from SOC Analysts

Olusola Akinrolabu et al.

13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)

Editorial Material Environmental Sciences

Emerging trends in geospatial artificial intelligence (geoAI): potential applications for environmental epidemiology

Trang VoPham et al.

ENVIRONMENTAL HEALTH (2018)

Article Computer Science, Theory & Methods

Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT plus OSINT): A timely and cohesive mix

Darren Quick et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Information Science & Library Science

Social media analytics - Challenges in topic discovery, data collection, and data preparation

Stefan Stieglitz et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Community Interaction and Conflict on the Web

Srijan Kumar et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Proceedings Paper Computer Science, Cybernetics

Classifying Sightseeing Tweets using Convolutional Neural Networks with Multi-Channel Distributed Representation

Shuichi Hashida et al.

2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2018)

Review Computer Science, Artificial Intelligence

Fighting against phishing attacks: state of the art and future challenges

B. B. Gupta et al.

NEURAL COMPUTING & APPLICATIONS (2017)

Article Engineering, Civil

Video Processing From Electro-Optical Sensors for Object Detection and Tracking in a Maritime Environment: A Survey

Dilip K. Prasad et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Information Systems

Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module

Miltiadis Kandias et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Panning for gold: Automatically analysing online social engineering attack surfaces

Matthew Edwards et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Phishing environments, techniques, and countermeasures: A survey

Ahmed Aleroud et al.

COMPUTERS & SECURITY (2017)

Proceedings Paper Computer Science, Artificial Intelligence

MARVEL: A Large-Scale Image Dataset for Maritime Vessels

Erhan Gundogdu et al.

COMPUTER VISION - ACCV 2016, PT V (2017)

Proceedings Paper Computer Science, Information Systems

Tracking Phishing Attacks Over Time

Qian Cui et al.

PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) (2017)

Proceedings Paper Computer Science, Information Systems

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

Xiaojing Liao et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Criminology & Penology

OSINT as an Integral Part of the National Security Apparatus

Babak Akhgar

OPEN SOURCE INTELLIGENCE INVESTIGATION: FROM STRATEGY TO IMPLEMENTATION (2016)

Article Computer Science, Theory & Methods

A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement

Matthew Edwards et al.

ACM COMPUTING SURVEYS (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network

Homa Hosseinmardi et al.

SOCIAL INFORMATICS (SOCINFO 2015) (2015)

Article History

Introducing Social Media Intelligence (SOCMINT)

David y Omand et al.

INTELLIGENCE AND NATIONAL SECURITY (2012)