25 results for “topic:national-security”
Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-Operated, Offensive & Defensive Cyber Espionage & State Sponsored Attack Framework With Automated Red, Blue & Purple Team, Auditing & Reporting Capabilties.
Foundational framework for mission-critical surveillance, autonomous video intelligence, and situational awareness.
Script pour scraper les député·e·s français (Nom, Région, Email, Groupe, Circonscription) depuis le site de l'Assemblée nationale.
:for-the: [[ DISCLΩSURE: CΩNTRΔCT ]]:= [[ QWΩD-MJ12: ΔTSΩSSDEV-Δ ]]:
An exploratory effort incubated by the Defense Entrepreneurs Forum that seeks to increase understanding of the national security innovation ecosystem, improve data literacy, and support learning mindsets with opportunities to experiment.
Nation Builder Pro ™ - For any county network vulnerabilites can severly compromise National Security. Many dusty computers in old backrooms (with outdated SOFTWARE) act as sources to malware, malware bots etc. Nation Builder Pro ™ helps identify vulnerable ports in your country. This research is a port of MAGNETRON TECHNOLOGY ™ RESEARCH.
🏆 1st Place – OpenAI Track (National Security) | SCSP x AGI House Hackathon 2025
z_edian's cybersecurity policy analyses
Unified framework for validating Egyptian National IDs with multiple language implementations (Python, Java, JavaScript, etc.)
Provides access to the AWS Mission Resilience Custom Lens for the Well Architected Tool.
:fΩr-thع: [[ Rعي:ΔRCㅐ: is-by: BΔNN3!: 5U5PEN!3!: is-by: N∅: is-with: N🚫☥⚠️CE: is-by: EVERY: is-with: 5ΩCIΔL: M3!IΔ: PLΔ☥F∅RM: is-with: WΔ: is-by: ☥URN: is-by: GitHub: for-the: [[ 5ΩLU☥I∅N: is-with: WΔ: CRΔ☥E: NEW: QUΔ!☥UM-CΩMPU☥I!G-PR∅G𓂀MMI!G-LΔ!GUΔGE: for-the: [[ !EFΔ☥ING: !𓂀C∅NIΔN: CEN5∅R5HIP: ΔLG∅RI☥HM5: ]]: ]]: ]]:
🛡️ National Cyber Threat Intelligence & Response System (NCTIRS) v2 — AI-Powered National Security & Smart Policing Intelligence Platform featuring Real-time Threat Analytics, SOAR Automation, Zero-Trust Architecture, and Google Gemini 2.0 Flash AI Engine. Built for Kenya 🇰🇪
A rigorous methodology for detecting authority pressure's effect on AI ethical "red lines".
AI-Powered National Security and Smart Policing Intelligence Platform (NSSPIP) - Next-generation Fusion Center integrating YOLOv8 Computer Vision, Scikit-Learn Predictive Risk Modeling, and NLTK Sentiment Analysis for proactive threat intelligence.
An independent brief on countering AI-led economic warfare using a sovereign geo-economic intelligence system.
Directed graph of national security law references
v3.0 Verified Audit: Mapping the structural dependency of the US Defense Industrial Base on Gulf Sovereign Wealth (Mubadala/PIF) and East Asian Industry.
A machine-learning pipeline that fuses real-time signals from military aviation, civic anomalies, geopolitical news sentiment, and global financial markets to output a continuously updated probability of imminent military conflict.
Dataset and R script used to produce the research paper titled "Inciting Violence: The Impact of Internet Propaganda on Terrorist Outcomes" located here: https://dx.doi.org/10.2139/ssrn.4035908
MoNoRi-Chan's Jade Temple
National Security Infrastructure for Parliamentary Accountability in Kenya — NLP-powered civic tech tracking 14 security dimensions across 26 .go.ke sources. Built for NIRU AI Hackathon 2026
HISSI: A policy concept to secure U.S. humanoid robotics supply chains for defense, ensuring trusted manufacturing and ethical standards. Feedback welcome!
Overview of national government activities.
생성형 AI를 활용한 국가안보 침해 내부자 행위 선제 감시 체계 설계
🤖 Secure the supply chain for humanoid robotics in U.S. defense, enhancing logistics and support roles through independent policy concepts.