<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Journal of Applied Mathematics and Computer Science</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/EISIC.2012.42</article-id>
      <title-group>
        <article-title>Capabilities through Process Automation: Advantages and Opportunities</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giorgi Iashvili</string-name>
          <email>giiashvili@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Caucasus University</institution>
          ,
          <addr-line>Paata Saakadze st. 1, Tbilisi, 0102</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <volume>124</volume>
      <issue>4</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Information gathering through open sources is a crucial aspect of cybersecurity activities in today's digital landscape. This process relies on publicly available sources, such as social networks, websites, and blogs. It encompasses data mining, data gathering techniques, data extraction, and data analysis activities. Open source intelligence (OSINT) methods are now widely utilized across various domains. In the context of penetration testing activities, OSINT processes are typically executed manually and managed by human operators. The integration of OSINT with machine learning (ML) elements can be beneficial in various sectors, such as everyday users, offices, and industrial or corporate environments. Combining data collection processes with general security regulations can yield better results for both production and end users. Platforms like TensorFlow leverage artificial intelligence to analyze massive amounts of data, as seen in Gmail and Google Translate platforms. In addition, numerous approaches are employed in social networks for friend suggestions and video streaming platforms for content recommendations. Utilizing artificial intelligence in OSINT activities can enhance the efficiency and quality of the search process, and consequently, the overall results of cybersecurity activities, including penetration testing. AI can automate various processes, such as web crawling, data collection, and pattern analysis. This opens up a wide range of new possibilities for building cybersecurity activities and exploring different vectors for data collection and its application in security events or penetration testing. Incorporating artificial intelligence in OSINT activities can also strengthen assistant mechanisms like Amazon Echo or Siri, enabling them to collect more relevant and rich data about a subject based on specific requirements.</p>
      </abstract>
      <kwd-group>
        <kwd>Machine learning</kwd>
        <kwd>OSINT</kwd>
        <kwd>open sources</kwd>
        <kwd>intelligence cycle</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Information gathering through open sources is a critical aspect of cybersecurity activities in today's
digital landscape. This process relies on publicly available sources, such as social networks, websites,
and blogs. It involves data mining and gathering techniques, as well as data extraction and analysis
activities. Open source intelligence (OSINT) methods are widely employed across various domains. In
the context of penetration testing activities, these processes are typically executed manually and
managed by human operators.</p>
      <p>Transitioning from manual to automated processes in OSINT is essential, particularly when dealing
with real-world operations. A comprehensive system should be developed to facilitate automated
open</p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>ceur-ws.org
source-based activities, in conjunction with training simulations for machine learning. The architecture
of the machine learning approach is contingent upon specific requirements.</p>
      <p>• Based on our research we can obtain the following requirements:
• The data used in previous user activities;
• Gathering information using web crawlers and / or scrapers;
• Processing activities like pattern recognition and events detection;
• Vision of the automated mechanisms in the processes;
• Analytics based on matching the patterns and data visualization;
• Automation of the responses, error messages;</p>
    </sec>
    <sec id="sec-2">
      <title>2. Use of OSINT in different sectors</title>
      <p>Within the scope of our research, we employ an approach that focuses on the aforementioned
aspects, which can be implemented using automated process mechanisms. Combining open source
intelligence with machine learning elements can be advantageous in various fields, such as everyday
users, offices, and industrial or corporate sectors. Integrating data collection processes with general
security regulations can yield improved results for both production and end users.</p>
      <p>We can highlight the following key fields from data gathering point of view:
•
•
•
•
•
•
•
•
•</p>
      <sec id="sec-2-1">
        <title>Cyber Intelligence groups;</title>
        <p>Law firms;
IT security personnel;
Special investigators;
IT oriented corporations
Financial and insurance sector;
Ethical hackers;
Black hat hackers;</p>
        <p>Hacktivist groups;
Open data: social media and sources:





</p>
      </sec>
      <sec id="sec-2-2">
        <title>Potential hosts;</title>
        <p>Information about domains;
Media lookup;
Contact details;
Files online;</p>
        <p>Location information;</p>
        <sec id="sec-2-2-1">
          <title>Data collection automated methods</title>
          <p>
            Automated data collection mechanisms are extensively employed across various sectors today. Even
technology giants like Google utilize AI in their search mechanisms to generate predictive search
results. Platforms such as TensorFlow leverage artificial intelligence to analyze vast amounts of data,
as seen in Gmail and Google Translate platforms. Additionally, numerous approaches are implemented
in social networks for friend suggestions and video streaming platforms for content recommendations.
In these instances, user activity and preference data are collected and processed by AI algorithms,
providing end users with improved recommendations and, consequently, enhancing the overall system's
efficiency. Figure 1 illustrates the intelligence cycle and its stages [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ].
          </p>
          <p>For better understanding of the process, we need to go through the entire intelligence process. It
consist of the following steps:</p>
          <p>1. Requirements identification: clarification of the requirements and search area. Choosing the right
direction, working with the requirements is an important step to start the process correctly and not lose
time to back to the beginning repeatedly.</p>
          <p>2. Data gathering process: defining the vectors of the work and planning activities. On this stage
should be defined the appropriate informational sources. Data collection process also can be performed
in different manner of the activities, such active and passive data gathering.</p>
          <p>3. User-friendly format generation: gathered information needs to be sorted and represented in
understandable format. It can be special spreadsheet or graphical representation, or even database with
prepared data.</p>
          <p>4. Information extracting process: the collected data needs to be processed and exploitation activities
should be performed based on the relevant information;</p>
          <p>5. Distribution of the information: gathered information should be shared with the trusted parties to
achieve more global results in the frame of the OSINT activities;</p>
          <p>6. Intelligence and requirements: the final feedback should be check to meet the requirements. The
accuracy of the entire process should be assessed.</p>
          <p>Together with the possibilities of artificial intelligence today, there are different limitations when it
goes to data gathering process. During such activities, we need to take into account the fact, that not
everything is reachable using open sources and in some cases on the internet itself. During the building
of AI-based OSINT working system, we need to consider the limitations and scenarios every time. As
in cyber security and attacks almost everything in based on working environment. Together with the
technical limitations, the ethical part is also should be considered.</p>
          <p>
            Cyber intelligence process automation refers to the implementation of automated technologies and
tools to gather, analyze, and disseminate cyber threat intelligence [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ]. This allows organizations to
improve their security posture by proactively identifying and addressing potential cyber threats. We can
set the following points to highlight the advantages of cyber intelligence process automation:
          </p>
        </sec>
        <sec id="sec-2-2-2">
          <title>Data Collection:</title>
          <p>Automation allows for the efficient and continuous collection of data from various sources, such as
open-source intelligence, social media, dark web, internal logs, and threat feeds. This reduces the
workload of analysts and ensures a more comprehensive and diverse set of data.</p>
        </sec>
        <sec id="sec-2-2-3">
          <title>Data Aggregation:</title>
          <p>Automated tools can aggregate and normalize data from multiple sources, which improves the
accuracy and relevance of the information. This helps organizations to gain a better understanding of
the overall threat landscape.</p>
        </sec>
        <sec id="sec-2-2-4">
          <title>Data Analysis:</title>
          <p>Automated analysis of the collected data can reveal patterns, trends, and anomalies that may not be
apparent to human analysts. Machine learning and artificial intelligence can be used to uncover hidden
relationships, predict potential threats, and assess the likelihood of specific attacks.</p>
        </sec>
        <sec id="sec-2-2-5">
          <title>Threat Prioritization:</title>
          <p>Automation can help prioritize threats based on the potential impact on the organization and the
level of risk involved. This enables security teams to focus on the most pressing issues and allocate
resources accordingly.</p>
        </sec>
        <sec id="sec-2-2-6">
          <title>Response and Remediation:</title>
          <p>Automated systems can recommend appropriate countermeasures and response strategies based on
the analyzed data. In some cases, they can even implement these measures, such as patching
vulnerabilities, blocking malicious IP addresses, or updating firewall rules.</p>
        </sec>
        <sec id="sec-2-2-7">
          <title>Continuous Monitoring:</title>
          <p>Automation enables continuous monitoring of the threat landscape, allowing organizations to adapt
their security strategies as new threats emerge. This ensures a proactive and agile approach to
cybersecurity.</p>
        </sec>
        <sec id="sec-2-2-8">
          <title>Knowledge Sharing:</title>
          <p>Automated tools can disseminate relevant and actionable intelligence to stakeholders throughout the
organization, fostering a more informed and collaborative security environment.</p>
        </sec>
        <sec id="sec-2-2-9">
          <title>Reducing Human Error:</title>
          <p>Automation reduces the likelihood of human errors in the cyber intelligence process, such as missed
threats, data entry mistakes, or incorrect analysis.</p>
        </sec>
        <sec id="sec-2-2-10">
          <title>Cost Savings:</title>
          <p>By automating repetitive tasks, organizations can reduce the need for additional staff, increase the
efficiency of existing staff, and ultimately reduce costs related to cybersecurity.</p>
        </sec>
        <sec id="sec-2-2-11">
          <title>Scalability:</title>
          <p>Cyber intelligence process automation can be easily scaled to meet the changing needs and growth
of an organization. As more data and resources become available, automated systems can adapt and
expand accordingly.</p>
          <p>
            From the points above we can say that automating the cyber intelligence process offers numerous
advantages, such as improved efficiency, accuracy, and scalability. It enables organizations to
proactively address potential threats, reduce human error, and save costs [
            <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
            ].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Use of AI in OSINT</title>
      <p>Use of artificial intelligence in OSINT activities can increase the efficiency and quality of the search
process and consequentially the results of the entire cyber security activity, for example penetration
testing. Using an artificial intelligence a lot of processes like web crawling, collection of the data,
analysis of the patterns can be automate. This fact gives a wide range of new possibilities in building
of cyber security activities and different vectors for data collecting and it’s usage for security events or
during penetration testing. As artificial intelligence algorithms learn based on the previews experience,
it might have an impact on the entire process. A good example would be the suggestions of the videos
on modern video streaming services. Recommendation works based on different parameters, like
userpreferred categories, music genre or timing. The process of the open source intelligence works as
follows [5-7]:
1. Work with sources of information to get the relevant ones;
2. Data gathering process using appropriate informational sources;
3. Processing of the information based on the sources and search requirements;
4. Data collection and analysis based on multiple sources;
5. Generation of the results and reporting activities;</p>
    </sec>
    <sec id="sec-4">
      <title>4. AI use in intelligence cycle</title>
      <p>AI systems will be able to combine OSINT data with geospatial and temporal information to provide
a more contextualized understanding of events and threats, improving situational awareness and
decision-making.</p>
      <p>Network and Relationship Analysis:</p>
      <p>By leveraging machine learning and graph-based algorithms, AI can uncover hidden relationships,
patterns, and networks within OSINT data, helping to identify key influencers, threat actors, or potential
collaborators.</p>
      <p>Automated Threat Assessment and Prioritization:</p>
      <p>AI systems will automatically assess and prioritize threats based on factors such as impact,
likelihood, and relevance to the organization, helping security teams focus their efforts on the most
pressing issues.</p>
      <p>Predictive Analytics:</p>
      <p>Advanced AI models will be able to predict future events, trends, or threats based on historical data
and current patterns, providing organizations with valuable foresight and strategic planning capabilities.</p>
      <p>Customization and Personalization:</p>
      <p>AI-powered OSINT platforms will offer tailored intelligence feeds based on an organization's
specific interests, needs, and risk profile, ensuring that relevant and actionable information is readily
available.</p>
      <p>Improved Collaboration and Knowledge Sharing:</p>
      <p>AI-driven OSINT tools will facilitate better collaboration and knowledge sharing among analysts,
organizations, and other stakeholders, resulting in a more informed and unified approach to security
and intelligence.</p>
      <p>In conclusion, the future of AI use in OSINT will likely involve a more advanced, integrated, and
efficient approach to intelligence gathering and analysis. This will empower organizations to better
understand and navigate the complex and ever-evolving threat landscape, making more informed
decisions and taking proactive measures to ensure their security [8,9].</p>
    </sec>
    <sec id="sec-5">
      <title>5. Artificial intelligence methods use in open source intelligence</title>
      <p>A practical example of AI use in OSINT is sentiment analysis for tracking public opinion on a
specific topic, such as political events or product launches. Sentiment analysis is a technique that uses
NLP and machine learning to identify and classify the sentiment of text data into positive, negative, or
neutral categories. One common mathematical model used in sentiment analysis is the Naïve Bayes
classifier.</p>
      <p>We can describe the example of how the Naïve Bayes classifier can be used for sentiment analysis
in OSINT:</p>
      <sec id="sec-5-1">
        <title>Data Collection:</title>
        <p>Gather text data from public sources such as social media, news articles, and forums related to the
topic of interest.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Preprocessing:</title>
        <p>Clean and preprocess the data by removing irrelevant information (e.g., URLs, special characters),
converting text to lowercase, and tokenizing words.</p>
      </sec>
      <sec id="sec-5-3">
        <title>Training Data and Feature Extraction:</title>
        <p>Split the dataset into a training set and a testing set. Manually label a portion of the training set with
the sentiment categories (positive, negative, or neutral). Extract features from the text, such as word
frequencies or n-grams, to create a feature matrix.</p>
      </sec>
      <sec id="sec-5-4">
        <title>Naïve Bayes Classifier:</title>
        <p>The Naïve Bayes classifier is a probabilistic model that calculates the probability of a given
sentiment category (e.g., positive) based on the features extracted from the text. The model is based on
Bayes' theorem, which is formulated as:
 ( _ | ) =  ( | _ ) ∗  ( _ ) /  ( )
(1)
•
•
•
•</p>
        <p>P(C_k|X) is the posterior probability of class (sentiment category) C_k given the features X.
P(X|C_k) is the likelihood of the features X given the class C_k.</p>
        <p>P(C_k) is the prior probability of class C_k.</p>
        <p>P(X) is the probability of the features X.</p>
        <p>The Naïve Bayes classifier makes a "naïve" assumption that the features are conditionally
independent given the class, which simplifies the likelihood calculation. For text data, the likelihood is
typically calculated using the bag-of-words representation:
 ( | _ ) =  ( _1| _ ) ∗  ( _2| _ ) ∗ . . .∗  ( _ | _ )
(2)</p>
      </sec>
      <sec id="sec-5-5">
        <title>Model Training:</title>
        <p>Using the labeled training data, calculate the likelihoods and prior probabilities for each sentiment
category. This will form the basis for the Naïve Bayes classifier.</p>
      </sec>
      <sec id="sec-5-6">
        <title>Prediction:</title>
        <p>Apply the trained Naïve Bayes classifier to the testing set to predict the sentiment of the unlabeled
text data. Choose the sentiment category with the highest posterior probability as the final prediction.</p>
      </sec>
      <sec id="sec-5-7">
        <title>Evaluation and Analysis:</title>
        <p>Evaluate the performance of the classifier by comparing its predictions to the actual sentiment labels.
Analyze the results to gain insights into public opinion on the topic of interest.</p>
        <p>In this example, the Naïve Bayes classifier is used as the mathematical model for sentiment analysis
in OSINT. This practical application demonstrates how AI can be utilized to gather and analyze public
opinion data from open sources, providing valuable insights for decision-making and strategic planning
[10-12].</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Processing of textual data</title>
      <p>For textual data processing we can use Python library for processing textual data - TextBlob. It
provides a simple API for common natural language processing (NLP) tasks such as part-of-speech
tagging, noun phrase extraction, sentiment analysis, classification, translation, and more. TextBlob is
built on top of the NLTK (Natural Language Toolkit) library, making it an easy-to-use interface for
working with textual data.</p>
      <p>TextBlob's sentiment analysis functionality is based on a pre-trained Naïve Bayes classifier. This
classifier has been trained on a dataset of movie reviews, with the goal of determining whether the
reviews are positive or negative. The sentiment analysis in TextBlob returns two values: polarity and
subjectivity. Polarity is a float between -1 and 1, representing the sentiment's negativity or positivity,
while subjectivity is a float between 0 and 1, representing the level of subjectivity or objectivity of the
text.</p>
      <p>The following pseudocode represents the Python script for gathering and analyzing public opinion
data from Twitter using TextBlob's sentiment analysis:</p>
      <p>This pseudocode outlines the main steps for fetching tweets based on a search query and analyzing
their sentiment using TextBlob's sentiment analysis feature. The results are then displayed as
percentages of positive, neutral, and negative sentiments [13,14].</p>
      <p>Enhancing cyber intelligence capabilities through process automation has emerged as a critical
aspect of contemporary cybersecurity strategies. While it offers numerous advantages in terms of
scalability, speed, and efficiency, there are several potential difficulties and challenges associated with
this endeavor. This paper aims to discuss these challenges, which include:</p>
      <p>Complexity of cyber threats: The constantly evolving nature of cyber threats, along with their
increasing complexity, poses a challenge to the effectiveness of process automation. Developing
automated systems that can keep pace with the rapid advancements in threat techniques necessitates
continuous adaptation and updates.</p>
      <p>Integration challenges: A seamless integration of process automation tools with existing cyber
intelligence systems is crucial for optimal performance. This may prove to be difficult, given the wide
array of systems, platforms, and applications used by organizations. The integration process may be
time-consuming and costly, further complicating the adoption of process automation.</p>
      <p>False positives and negatives: The automated systems may generate false positives and false
negatives, potentially leading to missed threats or unnecessary alerts. This challenge necessitates the
development of sophisticated algorithms that can accurately identify true threats while minimizing false
detections.</p>
      <p>Human factor: The reliance on automation may lead to a reduction in human involvement,
potentially undermining the role of human expertise in cyber intelligence. A balance between automated
and human-driven processes is essential to ensure that valuable insights from human analysts are not
lost.</p>
      <p>Legal and ethical considerations: As process automation tools become more sophisticated, the
potential for misuse and abuse increases. Ensuring that these tools are deployed ethically and in
accordance with relevant laws and regulations is a critical challenge that needs to be addressed.</p>
      <p>Data privacy and security: Process automation tools may require access to vast amounts of sensitive
data, which raises concerns about data privacy and security. Ensuring that the data used by these tools
is stored and processed securely is a vital challenge.</p>
      <p>Skills shortage: Implementing process automation in cyber intelligence requires a workforce skilled
in both cybersecurity and automation technologies. The current shortage of such skilled professionals
may hinder the widespread adoption of process automation.</p>
      <p>Cost considerations: The development, implementation, and maintenance of process automation
tools can be costly. Organizations must weigh the benefits of automation against the financial
investment required to implement and maintain these systems.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>In conclusion, the future of AI in the OSINT sphere appears promising and poised for significant
advancements. As AI technologies, such as natural language processing, machine learning, and
computer vision, continue to improve, their applications in OSINT will become more sophisticated,
accurate, and efficient. The integration of AI in OSINT will lead to the following key developments:</p>
      <p>Enhanced data collection and analysis: AI-powered tools will be able to gather and analyze data
from a broader range of sources, such as social media, news outlets, blogs, forums, and the deep/dark
web. This will provide a more comprehensive and diverse dataset for organizations to analyze and
respond to.</p>
      <p>Real-time monitoring and response: AI-driven OSINT platforms will enable real-time analysis of
data, allowing organizations to identify emerging events, trends, and threats rapidly. This will facilitate
more proactive responses to potential issues and improve overall situational awareness.</p>
      <p>Improved accuracy and efficiency: AI algorithms will be able to identify patterns, trends, and
anomalies more accurately, reducing false positives and false negatives in the analysis process.
Automation will also increase efficiency, allowing organizations to process large amounts of data more
quickly and effectively.</p>
      <p>Predictive analytics: Advanced AI models will enable organizations to predict future events, trends,
or threats based on historical data and current patterns. This will provide valuable foresight and support
strategic planning and decision-making.</p>
      <p>Customization and personalization: AI-powered OSINT platforms will offer tailored intelligence
feeds based on an organization's specific interests, needs, and risk profile. This will ensure that relevant
and actionable information is readily available to stakeholders.</p>
      <p>Enhanced collaboration and knowledge sharing: AI-driven OSINT tools will foster better
collaboration and knowledge sharing among analysts, organizations, and other stakeholders, resulting
in a more informed and unified approach to security and intelligence.</p>
      <p>The adoption of AI in the OSINT sphere will continue to grow as technologies evolve and
organizations recognize the value of AI-driven intelligence gathering and analysis. The future of AI in
OSINT will be characterized by increased efficiency, accuracy, and effectiveness in processing and
understanding vast amounts of publicly available information, ultimately leading to better-informed
decision-making and more robust security strategies.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Acknowledgements</title>
      <p>This work was supported by Shota Rustaveli National Foundation of Georgia
(SRNSFG)[NFR-2214060].</p>
    </sec>
    <sec id="sec-9">
      <title>9. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Iashvili</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Avkurova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iavich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauyrzhan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gagnidze</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Content-Based Machine Learning Approach for Hardware Vulnerabilities Identification System</article-title>
          . In: Hu,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Petoukhov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Dychka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>(eds) Advances in Computer Science for Engineering and Education IV</article-title>
          .
          <source>ICCSEEA 2021. Lecture Notes on Data Engineering and Communications Technologies</source>
          , vol
          <volume>83</volume>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          - 80472-5_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Backfried</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pfeiffer</surname>
          </string-name>
          , G. Quirchmayr,
          <string-name>
            <given-names>M.</given-names>
            <surname>Glanzer</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Rainer</surname>
          </string-name>
          ,
          <article-title>"Open Source Intelligence in Disaster Management," 2012 European Intelligence</article-title>
          and Security Informatics Conference,
          <year>2012</year>
          , pp.
          <fpage>254</fpage>
          -
          <lpage>258</lpage>
          , doi: 10.1109/EISIC.
          <year>2012</year>
          .
          <volume>4</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cho</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>"A Reliability Comparison Method for OSINT Validity Analysis,"</article-title>
          <source>in IEEE Transactions on Industrial Informatics</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>5428</fpage>
          -
          <lpage>5435</lpage>
          , Dec.
          <year>2018</year>
          , doi: 10.1109/TII.
          <year>2018</year>
          .
          <volume>2857213</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Casanovas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Cyber Warfare and Organised Crime. A Regulatory Model and MetaModel for Open Source Intelligence (OSINT)</article-title>
          . In: Taddeo,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Glorioso</surname>
          </string-name>
          ,
          <string-name>
            <surname>L</surname>
          </string-name>
          . (eds) Ethics and
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>