<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dmytro Lande</style></author><author><style face="normal" font="default" size="100%">Igor Subach</style></author><author><style face="normal" font="default" size="100%">Alexander Puchkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A System for Analysis of Big Data from Social Media</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">big data</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber Aggregator</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">OSINT</style></keyword><keyword><style  face="normal" font="default" size="100%">social media monitoring</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">44-61</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The article presents the basic principles of building and using a monitoring and analysis system of social media on cybersecurity, based on the concepts of Big Data, Data/Text Mining, Information Extraction, Complex Networks. The authors substantiate information technologies for creating a system of content monitoring, selection of relevant information from social networks, implementation of search engines for their refinement by users, saving queries as RSS feeds, and maintaining personal databases in client applications.&lt;/p&gt;&lt;p&gt;The described OSINT system is based on collection of information from open sources, its analysis, preparation and timely delivery of the final product to the customer in order to solve certain intelligence tasks. Hence, the system is the result of a systematic collection, processing and analysis of the necessary publicly available information. It is based on the application of methods and tools of information retrieval, data analysis and aggregation of information flows, and is used for social media content monitoring as a component of decision support systems for information and cybersecurity.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">44</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dmytro Lande</style></author><author><style face="normal" font="default" size="100%">Igor Subach</style></author><author><style face="normal" font="default" size="100%">Artyom Sobolyev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computer program of social networks content monitoring on cybersecurity - &quot;CyberAggregator&quot;</style></title><secondary-title><style face="normal" font="default" size="100%">Certificate of registration of copyright to the work from 31.07.2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dwl.kiev.ua/art/AS/as91831/</style></url></web-urls></urls><number><style face="normal" font="default" size="100%">91831</style></number><pub-location><style face="normal" font="default" size="100%">Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dmytro Lande</style></author><author><style face="normal" font="default" size="100%">Igor Subach</style></author><author><style face="normal" font="default" size="100%">Yu. Boyarinova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Fundamentals of the theory and practice of data mining in the field of cyber security: a textbook</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dwl.kiev.ua/art/oiad/</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Institute of Special Communications and Information Protection of National Technical University of Ukraine «Igor Sikorsky Kyiv Polytechnic Institute»</style></publisher><pub-location><style face="normal" font="default" size="100%">Kyiv</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>