Daskevics, A. and Nikiforova, A. (2021). ShoBeVODSDT:
Shodan and Binary Edge based vulnerable open data
sources detection tool or what Internet of Things
Search Engines know about you. In Proceedings of
the 2nd IEEE International Conference on Intelligent
Data Science Technologies and Applications (IDSTA),
pages 38–45.
Fang, Y., Guo, Y., Huang, C., and Liu, L. (2019). Ana-
lyzing and Identifying Data Breaches in Underground
Forums. IEEE Access, 7:48770–48777.
Gibson, H. (2016). Acquisition and Preparation of Data for
OSINT Investigations. In Akhgar, B., Bayerl, P. S.,
and Sampson, F., editors, Open Source Intelligence In-
vestigation: From Strategy to Implementation, pages
69–93. Springer International Publishing, Cham.
Google (2022a). Natural Language API. https://cloud.
google.com/natural-language. Accessed 10-10-2022.
Google (2022b). Vision AI. https://cloud.google.com/
vision. Accessed 10-10-2022.
Hickey, M. and Arcuri, J. (2020). Open Source Intelligence
Gathering, pages 55–86. Wiley Data and Cybersecu-
rity.
Hunt, T. (2022). Have I Been Pwned: Check if your
email has been compromised in a data breach. https:
//haveibeenpwned.com. Accessed 10-10-2022.
IBM Developer (2022). Watson APIs - Resources and
Tools. Accessed 10-10-2022.
Kanta, A., Coisel, I., and Scanlon, M. (2020). Smarter Pass-
word Guessing Techniques Leveraging Contextual In-
formation and OSINT. In 2020 International IEEE
Conference on Cyber Security and Protection of Dig-
ital Services (Cyber Security), pages 1–2.
Kanta, A., Coisel, I., and Scanlon, M. (2022). A Novel
Dictionary Generation Methodology for Contextual-
Based Password Cracking. IEEE Access, 10:59178–
59188.
LastPass (2021). The 2021 Password Security Re-
port. https://www.lastpass.com/de/resources/ebook/
psychology-of-passwords-2021. Accessed 10-10-
2022.
Lee, M., Liang, P., and Yang, Q. (2022). CoAuthor: De-
signing a Human-AI Collaborative Writing Dataset
for Exploring Language Model Capabilities. In Pro-
ceedings of the ACM Conference on Human Factors
in Computing Systems (CHI).
Martins, C. and Medeiros, I. (2022). Generating Quality
Threat Intelligence Leveraging OSINT and a Cyber
Threat Unified Taxonomy. ACM Trans. Priv. Secur.,
25(3).
Microsoft (2022a). Face API. https://azure.microsoft.com/
en-us/products/cognitive-services/face/. Accessed
10-10-2022.
Microsoft (2022b). Text analytics. https://azure.microsoft.
com/en-us/products/cognitive-services/text-analytics.
Accessed 10-10-2022.
MISP Project (2022). MISP taxonomies and classifica-
tion as machine tags. https://www.misp-project.org/
taxonomies.html#
osint. Accessed 10-10-2022.
Nordine, J. (2022). OSINT Framework. https://
osintframework.com. Accessed 10-10-2022.
Notz, M., Grambau, J., and Hitzges, A. (2019). Evaluation
of Sentiment Databases: A Comparison of Sentiment
Databases through Social Listening Statements and
Azure Machine Learning Studio. In Proceedings of
the 3rd ACM International Conference on E-Business
and Internet (ICEBI), page 8–12.
Noubours, S., Pritzkau, A., and Schade, U. (2013). Nlp as
an essential ingredient of effective osint frameworks.
In Proceedings of the IEEE Military Communications
and Information Systems Conference (MILCIS), pages
1–7.
Pastor-Galindo, J., Nespoli, P., G
´
omez M
´
armol, F., and
Mart
´
ınez P
´
erez, G. (2020). The Not Yet Exploited
Goldmine of OSINT: Opportunities, Open Challenges
and Future Trends. IEEE Access, 8:10282–10304.
Peng, P., Xu, C., Quinn, L., Hu, H., Viswanath, B., and
Wang, G. (2019). What Happens After You Leak
Your Password: Understanding Credential Sharing on
Phishing Sites. In Proceedings of the 2019 ACM Asia
Conference on Computer and Communications Secu-
rity (Asia CCS), page 181–192.
Sharad Sonawane, H., Deshmukh, S., Joy, V., and Hadsul,
D. (2022). Torsion: Web Reconnaissance using Open
Source Intelligence. In Proceedings of the 2nd IEEE
International Conference on Intelligent Technologies
(CONIT), pages 1–4.
Sherlock Project Team (2022). Sherlock Project. https://
sherlock-project.github.io. Accessed 10-10-2022.
V., A. A., A. K., B., R., M., Subbaraj, K., and Kumar Mo-
han, A. (2020). PeopleXploit : A hybrid tool to collect
public data. In Proceedings of the 4th IEEE Interna-
tional Conference on Computer, Communication and
Signal Processing (ICCCSP), pages 1–6.
Verizon (2022). Data Breach Investigations Report 2022.
https://www.verizon.com/business/resources/reports/
2022/dbir/2022-data-breach-investigations-report-
dbir.pdf. Accessed 10-10-2022.
Wilkening, F., Stiemert, L., Schopp, M., P
¨
ohn, D., and
Hommel, W. (2022). Investigating Leaked Sensi-
tive Information in Version Control Systems with the
Kraulhorizon Framework. In Sicherheit in vernetzten
Systemen: 29. DFN-Konferenz, pages C1–C21. Books
on Demand.
Yang, H.-C. and Lee, C.-H. (2012). Mining open source
text documents for intelligence gathering. In Pro-
ceedings of the International IEEE Symposium on In-
formation Technologies in Medicine and Education
(ITiME), volume 2, pages 969–973.
Zhang, Y., Monrose, F., and Reiter, M. K. (2010). The Secu-
rity of Modern Password Expiration: An Algorithmic
Framework and Empirical Analysis. In Proceedings
of the 17th ACM Conference on Computer and Com-
munications Security (CCS), pages 176–186.
Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
409