A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Open source intelligence and AI: a systematic review of the GELSI literature

R Ghioni, M Taddeo, L Floridi - AI & society, 2024 - Springer
Today, open source intelligence (OSINT), ie, information derived from publicly available
sources, makes up between 80 and 90 percent of all intelligence activities carried out by …

From treatment to healing: envisioning a decolonial digital mental health

SR Pendse, D Nkemelu, NJ Bidwell, S Jadhav… - Proceedings of the …, 2022 - dl.acm.org
The field of digital mental health is making strides in the application of technology to
broaden access to care. We critically examine how these technology-mediated forms of care …

[PDF][PDF] QAnon conspiracy theory: examining its evolution and mechanisms of radicalization

A Garry, S Walther, R Rukaya… - Journal for …, 2021 - cve-kenya.org
This report demonstrates the overarching need for additional exploration and intervention of
conspiracy-based radicalization as the QAnon conspiracy theory continues to grow. Strong …

Spotting political social bots in Twitter: A use case of the 2019 Spanish general election

J Pastor-Galindo, M Zago, P Nespoli… - … on Network and …, 2020 - ieeexplore.ieee.org
While social media has been proved as an exceptionally useful tool to interact with other
people and massively and quickly spread helpful information, its great potential has been ill …

Current status and security trend of osint

YW Hwang, IY Lee, H Kim, H Lee… - … and Mobile Computing, 2022 - Wiley Online Library
Recently, users have used open‐source intelligence (OSINT) to gather and obtain
information regarding the data of interest. The advantage of using data gathered by OSINT is …

[HTML][HTML] Profiling users and bots in Twitter through social media analysis

J Pastor-Galindo, FG Mármol, GM Pérez - Information Sciences, 2022 - Elsevier
Social networks were designed to connect people online but have also been exploited to
launch influence operations for manipulating society. The deployment of social bots has …

Forensic conflict studies: Making sense of war in the social media age

J Hauter - Media, War & Conflict, 2023 - journals.sagepub.com
Online media is a blessing and a curse for academic research on war. On the one hand, the
internet provides unprecedented access to information from conflict zones. On the other …

Open source intelligence for malicious behavior discovery and interpretation

YT Huang, CY Lin, YR Guo, KC Lo… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Cyber threats are one of the most pressing issues in the digital age. There has been a
consensus on deploying a proactive defense to effectively detect and respond to adversary …

Common vulnerability scoring system prediction based on open source intelligence information sources

P Kuehn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …