<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">AI-driven Cybersecurity Solutions, Cyber Ranges for Education &amp; Training, and ICT Applications for Military Purposes</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Third International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2021, and summarises the results from four of its sessions: AI-driven Cybersecurity Solutions; Organisational and Ethical Considerations in Providing Cybersecurity; Cyber Ranges for Innovative Education &amp; Training; and Advanced ICT Solutions with Military Applications.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">DIGILIENCE 2020: Governance, Human Factors, Cyber Awareness, Information &amp; Security: An International Journal</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Governance Model of a Collaborative Networked Organization for Cybersecurity Research</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">79-98</style></pages><abstract><style face="normal" font="default" size="100%">This article presents the results of the analysis of governance and management practices of Collaborative Network Organisations (CNOs) in the Science and Technology domain. The aim is to support the process of de-signing a governance model of a cybersecurity network by identifying best governance and management practices of existing collaborative networks. The results presented in the article are based on the analysis of governance models of three relevant organisations: (1) NATO Science and Technology Organization; (2) the Gigabit European Academic Network; and (3) the European Defence Agency’s Capability Technology Groups. The common ground is that they are regarded as CNOs with a high degree of centralisation of funding streams and a high degree of centralisation of the main business and governance decisions. The method of analysis includes a literature review and desktop research. The information sources used for the analysis are official legal documents about the CNO’s governance and management, especially for potential members and customers’ engagement; organisation and expected competence level and behaviour of CNOs’ members; the charters, decisions, reports issued and approved by the central or regional governance bodies of the organisations.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">79</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Governance Model of a Cybersecurity Network: Best Practices in the Academic Literature</style></title><secondary-title><style face="normal" font="default" size="100%">ACM International Conference on Computer Systems and Technologies (CompSysTech'20)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">New York, NY, USA, ACM</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">ICT Governance, Human Factors and Cyber Situational Awareness</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The article summarises the results from the four sessions during the Second International Scientific Conference Digital Transformation, Cyber Security and Resilience DIGILIENCE 2020. These are ICT Governance and Management for Digital Transformation, Cyber Situational Awareness and Information Exchange, Human Systems Integration Approach to Cybersecurity and Education and Training for Cyber Resilience.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;While technological solutions are being developed to enhance cyber security, there is increasing awareness that besides a technical approach the role of human performance, decision making and organizational culture are critical to increase the effectiveness of responses to evolving cyber threats. Hence, the focus of this paper is on the role of the human factors in cyber security. It presents an analysis of data from a Subject Matter Experts&amp;rsquo; study carried out in Bulgaria in the end of 2018 in the framework of the project &amp;ldquo;Cyber security and opportunities for application of innovative technologies in the state administration of the Republic of Bulgaria.&amp;rdquo; The data was collected via online survey from 92 experts from the state administration, academia and business organizations.&lt;/p&gt;&lt;p&gt;&amp;nbsp; The paper covers the following topics: 1) The most important issues in cyber security in Bulgaria and the role of the human factors among them; 2) Recruitment, Retention, Education &amp;amp; Training of IT personnel; 3) The human factors as a source of security breaches; and 4) Future research in the area of human factors in cyber security. Based on the analysis of the data, conclusions and recommendations are summarized regarding the ways to change the role of the human factor from the system&amp;rsquo;s &amp;ldquo;weakest link&amp;rdquo; to a powerful resource to detect and mitigate cyber threats.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">77-89</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">No single tool is available to counter the diversity and complexity of hybrid threats, examined by the authors as a as a military strategy that blends conventional war-fare, irregular warfare, and cyber warfare. The concept of hybrid warfare is used to describe the flexible and complex dynamics of the battlespace requiring a highly adaptable and resilient response. Reflecting on recent NATO policies and documents, this article looks into the importance of strengthening societal resilience, understood as the ability of a state, organization or society to absorb and recover from a shock.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security and Opportunities for Application of Innovative Technologies in the work of the State Administration in Bulgaria</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">Bulgarian Academy of Sciences</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Interagency and International Cooperation in Countering Hybrid Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">39</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Promoting Interagency and International  Cooperation in Countering Hybrid Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The editorial article summarises the achievements of the International conference titled &amp;ldquo;Interagency and International Cooperation in Countering Hybrid Threats.&amp;rdquo; The articles in this volume cover a broad range of issues related to NATO, EU and national experiences in the research and practical activities in countering hybrid warfare.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Military Co-operation in South-Eastern Europe and the Future of Multinational Peace Support Operations</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><publisher><style face="normal" font="default" size="100%">Rome: NATO Defence College</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An approach for prioritisation of national interests of the EU Member States</style></title><secondary-title><style face="normal" font="default" size="100%">JDST</style></secondary-title></titles><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">55-83</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record></records></xml>