<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Hygiene Issues in the Naval Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">205-218</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the present study, the main characteristics and components of cyber hygiene as a subclass of cybersecurity are discussed. Based on institutional experience in the scope of security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in naval institutions is recommended. Main cyber hygiene definitions are given. Cyber hygiene software issues and institutional information security controls are analyzed. Malware infection as the main cyber hygiene concern is analyzed. Basic cyber hygiene instructions to ensure Internet users stay protected are defined.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">205</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Cybersecurity Issues in the Maritime Industry</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">27-43</style></pages><abstract><style face="normal" font="default" size="100%">The maritime industry with its main components—port logistics, ships, cargo and container distribution systems, autonomous control and navigation systems, global identification and navigation systems—is a substantial and plausible target of cyberattacks. The goal of the present study is to reveal and de-scribe all components of the shipping industry’s cybersecurity policy, the main types of cyberattacks, methods, means, and stages of implementation, cyber vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">317-327</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Ransomware is a type of malicious activity aiming to prevent users from accessing their data by encrypting it. For the purposes of analysis of the behaviour of the crypto viruses, objectively collected data is required. Getting metrics from a virtual machine would be resembling the original behaviour of the ransomware on a physical device. Observing, measuring, collecting and extracting data on a physical device during and after encryption is challenging, since all the data would be corrupted once the encryption process is complete. By utilizing two user profiles, members of the local admin group and custom access control lists on certain recourse, a lab laptop is infected with five different samples of ransomware crypto viruses that do not require connection to the command and control server in order to function as intended. A  of HDD metrics is successfully collected and extracted.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">317</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Result oriented time correlation between security and risk assessments, and individual environment compliance framework</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference Europe Middle East &amp; North Africa Information Systems and Technologies to Support Learning, Smart Innovation, Systems and Technologies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pages><style face="normal" font="default" size="100%">373-383</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Gamification in Education as a Way for Improving Student Knowledge and Productivity</style></title><secondary-title><style face="normal" font="default" size="100%">11th International Scientific Conference &quot;Digital Economy and Blockchain Technologies&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><pub-location><style face="normal" font="default" size="100%">Varna</style></pub-location><pages><style face="normal" font="default" size="100%">445-452</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Gamification in the University Classrooms</style></title><secondary-title><style face="normal" font="default" size="100%">Seventh national conference “E-learning in higher education”</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">232-236</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Nyakoi osobenosti na metodikata pri obuchenieto za izpolzvane na slozjni programni produkti</style></title><secondary-title><style face="normal" font="default" size="100%">Morski nauchen forum</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><pub-location><style face="normal" font="default" size="100%">Varna</style></pub-location><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">225-230 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>