A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
Integrating technical and legal concepts of privacy
A Sokolovska, L Kocarev - Ieee Access, 2018 - ieeexplore.ieee.org
We provide an overview of legal and technical concepts of privacy protection. Data
protection guarantees exist in European Union at a primary law level since 2009, when the …
protection guarantees exist in European Union at a primary law level since 2009, when the …
Privacy and data protection in Australia: a critical overview
D Watts, P Casanovas - W3C Workshop on Privacy and Linked Data, 2019 - ddd.uab.cat
This extended abstract describes the regulation of privacy under Australian laws and
policies. In the CRC D2D programme, we will develop a strategy to model legal …
policies. In the CRC D2D programme, we will develop a strategy to model legal …
A Schema-Driven Synthetic Knowledge Graph Generation Approach With Extended Graph Differential Dependencies (GDDxs)
Knowledge Graphs (KGs), as one of the key trends which are driving the next wave of
technologies, have now become a new form of knowledge representation, and a …
technologies, have now become a new form of knowledge representation, and a …
On the formal representation of the australian spent conviction scheme
We discuss how to use Defeasible Deontic Logic to provide a formal representation of the
Commonwealth of Australia spent conviction schema (Part VII C of the Crimes Act (1914)) …
Commonwealth of Australia spent conviction schema (Part VII C of the Crimes Act (1914)) …
ASMaaS: Automatic Semantic Modeling as a Service
Traditionally the integration of data from multiple sources is done on an ad-hoc basis for
each analysis scenario and application. This is an approach that is inflexible, incurs high …
each analysis scenario and application. This is an approach that is inflexible, incurs high …
Variety management for big data
Of the core challenges originally associated with Big Data, namely Volume, Velocity, and
Variety, the Variety aspect is the one that is least addressed by the standard analytics …
Variety, the Variety aspect is the one that is least addressed by the standard analytics …
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
T Oakley Browne, M Abedin, MJM Chowdhury - 2024 - opal.latrobe.edu.au
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
[PDF][PDF] Towards a linked information architecture for integrated law enforcement
Law enforcement agencies are facing an ever-increasing flood of data to be acquired,
stored, assessed and used. Automation and advanced data analysis capabilities are …
stored, assessed and used. Automation and advanced data analysis capabilities are …
Semantic workflows in law enforcement investigations and legal requirements
Investigations conducted by law enforcement agencies depend on information that is
obtained from a variety of sources, internal and external to the organization. Considering …
obtained from a variety of sources, internal and external to the organization. Considering …