<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Multimedia Communications, Services and Security, MCSS 2022: Multimedia Communications, Services and Security </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><volume><style face="normal" font="default" size="100%">1689</style></volume><pages><style face="normal" font="default" size="100%"> 49–65</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Expert’s study on situational awareness of operations directed at the wide dissemination of malicious information</style></title><secondary-title><style face="normal" font="default" size="100%">Conference Proceedings, MODS2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Chernihiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">182-197</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Many organizations experience cyberattacks with the aim of the dissemination of malicious information. Situational awareness is a tool to counteract the campaigns of malicious information and reduce its dissemination. This article proposes a conceptual model for a cyber defence awareness system, which aims to support human operators to avoid this type of threat. The system will identify (classify) three campaign types of malicious information operations – malicious information injections in web content, malicious information injections in fake social network accounts, and malicious information dissemination via email messages. A model for identification of the type of campaign of malicious information operations based on Dempster-Shafer evidence theory is proposed. The work presented here is a part of the Cyber Rapid Analysis for Defence Awareness of Real-time Situation - CyRADARS project.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">182</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Requirements for the Sensor Platform and Network for Indoor Deployment and Exterior Based Radiofrequency Awareness</style></title><secondary-title><style face="normal" font="default" size="100%">,” International Research Conference 105 Years Security and Defense Research</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">6-7 April</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://rndc.bg/wp-content/uploads/2020/01/105-VA.pdf</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Bulgarian Military Academy “G. S. Rakovski ”</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">209-303</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Towards Security Requirements of the SPIDER Projec</style></title><secondary-title><style face="normal" font="default" size="100%">Scientific Conference with International Participation on Cyber security in the Information Society</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 19-20 2017</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Shumen, Bulgaria</style></pub-location><pages><style face="normal" font="default" size="100%">25-31</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A formal models for mobile AD HOC networks group interactions</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the Eighth International Scientific Conference ‘HEMUS-2016’</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><pages><style face="normal" font="default" size="100%">III-288 - III-294</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Model of cluster routing algorithm for mobile self-organizing networks for defense and security</style></title><secondary-title><style face="normal" font="default" size="100%">scientific conference with international participation &quot;Society of knowledge and humanism of the XXI century</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Oct. 31 - Nov. 1</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">UniBIT, BAS</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling Interactions in Mobile Distributed Networks </style></title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Intel Entrance Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Model for Defining the Software System State</style></title><secondary-title><style face="normal" font="default" size="100%">Sixth International Scientific Conference “Hemus-2012”</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><pages><style face="normal" font="default" size="100%"> II-51 - II-56</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling of an Error Monitoring and Management System for a Distributed Software Application</style></title><secondary-title><style face="normal" font="default" size="100%">Annual of the Defence Advanced Research Institute</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><pages><style face="normal" font="default" size="100%">149-157</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An approach for prioritisation of national interests of the EU Member States</style></title><secondary-title><style face="normal" font="default" size="100%">JDST</style></secondary-title></titles><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">55-83</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Model Cluster Routing Algorithm for Mobile Self-Organizing Defense and Security Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Scientific Conference with International Participation &quot;The 21st Century Knowledge Society and Humanism,&quot; Sofia, (UniBIT, BAS)</style></secondary-title></titles><dates><pub-dates><date><style  face="normal" font="default" size="100%">31 Octob - 1 Nov</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>