<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Power and Influence in a Globalized World</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">Atlantic Council</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, DC</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Artificial Intelligence and the Future of Defense: Strategic Implications for Small- and Medium-sized Force Providers</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><publisher><style face="normal" font="default" size="100%">The Hague Centre for Strategic Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">The Hague</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing Comprehensive Security Approaches in Action: An Introduction</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">5-9</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This article introduces the reader to the exploration of the evolving concept of security and the main findings, reflected in the contributions to this special issue of &amp;quot;Information &amp;amp; Security&amp;quot;.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Case study on North-West Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Deliverable</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">7.2</style></number><publisher><style face="normal" font="default" size="100%">EvoCS Consortium</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>