References
- Dawson ME Jr. Cyber Warfare: Threats and Opportunities [Internet]. Porto, Portugal: Universidade Fernando Pessoa; 2020 [cited 2025 Apr 20]. Available from: https://bdigital.ufp.pt/entities/publication/5e93c236-588a-4564-bfb6-982d33fe11b4.
- Dawson M. Integrating intelligence paradigms into cyber security curriculum for advanced threat mitigation. In: Information Technology – New Generations. Cham, Switzerland: Springer Nature; 2024. pp. 77–81.
- Oerlemans JJ, Langenhuijzen S. Balancing national security and privacy: examining the use of commercially available information in OSINT practices. Int J Intell CounterIntell. 2025;38(2):579–597.
- Browne TO, Abedin M, Chowdhury MJM. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. Int J Inf Secur. 2024;23(4):2911–2938.
- Stryker C, Kavlakoglu E. What is Artificial Intelligence (AI)? [Internet]. Armonk, NY: IBM; 2024 Aug 9 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/artificial-intelligence.
- Sevilla J, Heim L, Ho A, Besiroglu T, Hobbhahn M, Villalobos P. Compute trends across three eras of machine learning. In: International Joint Conference on Neural Networks (IJCNN). [Place unknown]: IEEE; 2022. pp. 1–8.
- IBM. What are large language models (LLMs)? [Internet]. Armonk, NY: IBM; 2023 Nov 2 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/large-language-models.
- OpenAI. GPT-4 technical report [Internet]. [Place unknown]: arXiv; 2023 [cited 2025 Apr 20]. Available from: https://arxiv.org/abs/2303.08774.
- EuRepoC. Dashboard - EuRepoC: European Repository of Cyber Incidents [Internet]. [Place unknown]: EuRepoC; 2023 Oct 13 [cited 2025 Apr 20]. Available from: https://eurepoc.eu/dashboard/.
- Kost E. What is an advanced persistent threat (APT)? [Internet]. Mountain View, CA: UpGuard; 2024 Nov 17 [cited 2025 Apr 20]. Available from: https://www.upguard.com/blog/what-is-an-advanced-persistent-threat.
- Conti M, Dargahi T, Dehghantanha A. Cyber threat intelligence: Challenges and opportunities. Adv Inf Secur. 2018;1–6.
- Baker K. What is Cyber Threat Intelligence? [Internet]. Austin, TX: CrowdStrike; 2025 Mar 4 [cited 2025 Apr 20]. Available from: https://www.crowdstrike.com/enus/cybersecurity-101/threat-intelligence/.
- Hwang YW, Lee IY, Kim H, Lee H, Kim D. Current status and security trend of OSINT. Wirel Commun Mob Comput. 2022;2022:1–14.
- MITRE ATT&CK®. APT Groups [Internet]. [Place unknown]: MITRE; [cited 2025 Apr 20]. Available from: https://attack.mitre.org/groups/.
- United States. Cybersecurity Act of 2015, 6 U.S.C. §§ 1501–1533, 2015.
- United States. Cybersecurity Enhancement Act of 2014, 15 U.S.C. §§ 7421–7430, 2014.
- Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J. Cyber Threat Intelligence Mining for Proactive Cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutor. 2023;25(3):1748–1774.
- Evangelista JR, Sassi RJ, Romero M, Napolitano D. Systematic literature review to investigate the application of Open Source Intelligence (OSINT) with Artificial Intelligence. J Appl Secur Res. 2020;16(3):345–369.
- RapidAPI. RapidAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/.
- RealtimeAPI. Facebook RealtimeAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/realtimeapi-realtimeapi-default/api/facebook-realtimeapi.
- RockApis. LinkedIn API8 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/rockapis-rockapis-default/api/linkedin-api8.
- AhnKiet N. Facebook Data API2 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/tml25092004/api/facebook-data-api2.
- davethebeast. Twitter241 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/davethebeast/api/twitter241.
- Meta. React [Internet]. [Place unknown]: Meta; [cited 2025 Apr 20]. Available from: https://reactjs.org/.
- Grinberg M. Flask [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://flask.palletsprojects.com/.
- Jocher G, et al. YOLOv8 [Internet]. [Place unknown]: Ultralytics; [cited 2025 Apr 20]. Available from: https://docs.ultralytics.com/.
- Serengil SI. DeepFace [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://github.com/serengil/deepface.
- Amazon Web Services, Inc. Amazon Web Services (AWS) [Internet]. [Place unknown]: AWS; [cited 2025 Apr 20]. Available from: https://aws.amazon.com/.
- Bier EA, Card SK, Bodnar JW. Entity-based collaboration tools for intelligence analysis. In: IEEE Symposium on Visual Analytics Science and Technology. Columbus, OH, USA: IEEE; 2008. pp. 99–106.
- Dawson M, Lieble M, Adeboje A. Open source intelligence: Performing data mining and link analysis to track terrorist activities. In: Information Technology – New Generations. Cham, Switzerland: Springer International Publishing; 2018. pp. 159–163.
