1. Reputation-based credibility analysis of twitter social network users: reputation-based credibility analysis of twitter social network users;Alrubaian,2017
2. Everyone’s an influencer: quantifying influence on twitter;Bakshy,2011
3. Robert david steele on OSINT;Berghel;Computer (Long Beach Calif),2014
4. A different cup of TI? the added value of commercial threat intelligence;Bouwman,2020
5. Cybersecurity automated information extraction techniques: Drawbacks of current methods, and enhanced extractors;Bridges,2017