This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
Dawson ME Jr. Cyber Warfare: Threats and Opportunities [Internet]. Porto, Portugal: Universidade Fernando Pessoa; 2020 [cited 2025 Apr 20]. Available from: https://bdigital.ufp.pt/entities/publication/5e93c236-588a-4564-bfb6-982d33fe11b4.Search in Google Scholar
Dawson M. Integrating intelligence paradigms into cyber security curriculum for advanced threat mitigation. In: Information Technology – New Generations. Cham, Switzerland: Springer Nature; 2024. pp. 77–81.Search in Google Scholar
Oerlemans JJ, Langenhuijzen S. Balancing national security and privacy: examining the use of commercially available information in OSINT practices. Int J Intell CounterIntell. 2025;38(2):579–597.Search in Google Scholar
Browne TO, Abedin M, Chowdhury MJM. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. Int J Inf Secur. 2024;23(4):2911–2938.Search in Google Scholar
Stryker C, Kavlakoglu E. What is Artificial Intelligence (AI)? [Internet]. Armonk, NY: IBM; 2024 Aug 9 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/artificial-intelligence.Search in Google Scholar
Sevilla J, Heim L, Ho A, Besiroglu T, Hobbhahn M, Villalobos P. Compute trends across three eras of machine learning. In: International Joint Conference on Neural Networks (IJCNN). [Place unknown]: IEEE; 2022. pp. 1–8.Search in Google Scholar
IBM. What are large language models (LLMs)? [Internet]. Armonk, NY: IBM; 2023 Nov 2 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/large-language-models.Search in Google Scholar
OpenAI. GPT-4 technical report [Internet]. [Place unknown]: arXiv; 2023 [cited 2025 Apr 20]. Available from: https://arxiv.org/abs/2303.08774.Search in Google Scholar
EuRepoC. Dashboard - EuRepoC: European Repository of Cyber Incidents [Internet]. [Place unknown]: EuRepoC; 2023 Oct 13 [cited 2025 Apr 20]. Available from: https://eurepoc.eu/dashboard/.Search in Google Scholar
Kost E. What is an advanced persistent threat (APT)? [Internet]. Mountain View, CA: UpGuard; 2024 Nov 17 [cited 2025 Apr 20]. Available from: https://www.upguard.com/blog/what-is-an-advanced-persistent-threat.Search in Google Scholar
Conti M, Dargahi T, Dehghantanha A. Cyber threat intelligence: Challenges and opportunities. Adv Inf Secur. 2018;1–6.Search in Google Scholar
Baker K. What is Cyber Threat Intelligence? [Internet]. Austin, TX: CrowdStrike; 2025 Mar 4 [cited 2025 Apr 20]. Available from: https://www.crowdstrike.com/enus/cybersecurity-101/threat-intelligence/.Search in Google Scholar
Hwang YW, Lee IY, Kim H, Lee H, Kim D. Current status and security trend of OSINT. Wirel Commun Mob Comput. 2022;2022:1–14.Search in Google Scholar
MITRE ATT&CK®. APT Groups [Internet]. [Place unknown]: MITRE; [cited 2025 Apr 20]. Available from: https://attack.mitre.org/groups/.Search in Google Scholar
United States. Cybersecurity Enhancement Act of 2014, 15 U.S.C. §§ 7421–7430, 2014.Search in Google Scholar
Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J. Cyber Threat Intelligence Mining for Proactive Cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutor. 2023;25(3):1748–1774.Search in Google Scholar
Evangelista JR, Sassi RJ, Romero M, Napolitano D. Systematic literature review to investigate the application of Open Source Intelligence (OSINT) with Artificial Intelligence. J Appl Secur Res. 2020;16(3):345–369.Search in Google Scholar
RapidAPI. RapidAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/.Search in Google Scholar
RealtimeAPI. Facebook RealtimeAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/realtimeapi-realtimeapi-default/api/facebook-realtimeapi.Search in Google Scholar
RockApis. LinkedIn API8 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/rockapis-rockapis-default/api/linkedin-api8.Search in Google Scholar
AhnKiet N. Facebook Data API2 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/tml25092004/api/facebook-data-api2.Search in Google Scholar
davethebeast. Twitter241 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/davethebeast/api/twitter241.Search in Google Scholar
Meta. React [Internet]. [Place unknown]: Meta; [cited 2025 Apr 20]. Available from: https://reactjs.org/.Search in Google Scholar
Grinberg M. Flask [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://flask.palletsprojects.com/.Search in Google Scholar
Jocher G, et al. YOLOv8 [Internet]. [Place unknown]: Ultralytics; [cited 2025 Apr 20]. Available from: https://docs.ultralytics.com/.Search in Google Scholar
Serengil SI. DeepFace [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://github.com/serengil/deepface.Search in Google Scholar
Amazon Web Services, Inc. Amazon Web Services (AWS) [Internet]. [Place unknown]: AWS; [cited 2025 Apr 20]. Available from: https://aws.amazon.com/.Search in Google Scholar
Bier EA, Card SK, Bodnar JW. Entity-based collaboration tools for intelligence analysis. In: IEEE Symposium on Visual Analytics Science and Technology. Columbus, OH, USA: IEEE; 2008. pp. 99–106.Search in Google Scholar
Dawson M, Lieble M, Adeboje A. Open source intelligence: Performing data mining and link analysis to track terrorist activities. In: Information Technology – New Generations. Cham, Switzerland: Springer International Publishing; 2018. pp. 159–163.Search in Google Scholar