Skip to content
#

influence-operations

Here are 6 public repositories matching this topic...

Language: All
Filter by language

🧠 Archive and analyze cognitive warfare research, linking real-world events to Seithar's Cognitive Defense Taxonomy for institutional insight.

  • Updated Apr 2, 2026
  • Python

Modèle de menace d'une infrastructure d'influence adversariale distribuée basée sur LLM locaux. Formalise ce qui est déployé par des acteurs étatiques sans documentation accessible aux analystes défensifs. La valeur est dans les surfaces de rupture, pas dans l'architecture.

  • Updated Apr 1, 2026

Improve this page

Add a description, image, and links to the influence-operations topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the influence-operations topic, visit your repo's landing page and select "manage topics."

Learn more