2018
DOI: 10.1109/tii.2018.2857213
|View full text |Cite
|
Sign up to set email alerts
|

A Reliability Comparison Method for OSINT Validity Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 12 publications
0
18
0
1
Order By: Relevance
“…The trustworthiness and authority of the information are indeed the key for successful OSINT investigations [41]. Ideally, the collected data should come from authoritative, reviewed and trusted sources (official documents, scientific reports, reliable communication media) [39].…”
Section: ) Data Sources Reliabilitymentioning
confidence: 99%
“…The trustworthiness and authority of the information are indeed the key for successful OSINT investigations [41]. Ideally, the collected data should come from authoritative, reviewed and trusted sources (official documents, scientific reports, reliable communication media) [39].…”
Section: ) Data Sources Reliabilitymentioning
confidence: 99%
“…When the data is collected from various data channels, the validity and reliability of the data must be considered. In our previous study [34], we proposed a model for determining the reliability of data collected from open source intelligence (OSINT). In [35], they show that CTI data analysis using machine learning technology may be vulnerable to data poisoning attacks.…”
Section: State Of the Artmentioning
confidence: 99%
“…Traceability, as an essential element to verify the context and validity of the data, means the tracing of data from generation to the analysis process and applications [34]. For the traceability of CTI data, metainformation of data-collection channels, environmental characteristics, and threat information should be configured together with enough strength of integrity fo the data.…”
Section: Traceabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Bu analiz belirli ağ algoritmaları üzerinden sınıflandırma yaparak ağ sistemini grafiklere dökerek hangi düğümün belirlenmesi gerektiğini tespit eder. Ayrıca karşılaştırma yaparak en önemli düğüm tespit edilir [20]. Bu en önemli düğüm tespiti çeşitli ağ algoritmaları kullanılarak hesaplanmaktadır.…”
Section: Abstract: Open Source Intelligence Security Osint Attack unclassified