{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Posea, Vlad, George Sharkov, Adrian Baumann, and Georgios Chatzichristos. "Towards Unified European Cyber Incident and Crisis Management Ontology." \i Information & Security: An International Journal\i0  53, no. 1 (2022): 33-44.\par \par Androulidakis, Iosif, Vyacheslav Kharchenko, and Andriy Kovalenko. "Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." \i Information & Security: An International Journal\i0  35, no. 1 (2016): 99-120.\par \par Ivanova, Yoana. \i Policies for the Protection of Critical Infrastructure from Cyber Attacks\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2014.\par \par Dimitrov, Michael. \i Why the Organization Needs Information Security Policy and Programme\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2013.\par \par }