{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Wallis, Tania, Chris Johnson, and Mohamed Khamis. "Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study  of the Effectiveness of the UK Implementation of the NIS Directive." \i Information & Security: An International Journal\i0  48, no. 1 (2021): 36-68.\par \par Kaponig, Hermann. "Austria?s National Cyber Security and Defense Policy: Challenges and the Way Forward." \i Connections: The Quarterly Journal\i0  19, no. 1 (2020): 21-37.\par \par Fluri, Philipp, and Todor Tagarev. "The Concept of Resilience: Security Implications and Implementation Challenges." \i Connections: The Quarterly Journal\i0  19, no. 3 (2020): 5-12.\par \par Leinhos, Ludwig. "Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr." \i Connections: The Quarterly Journal\i0  19, no. 1 (2020): 9-19.\par \par Tagarev, Todor, Salvatore Marco Pappalardo, and Nikolai Stoianov. "A Logical Model for Multi-Sector Cyber Risk Management." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 13-26.\par \par Goel, Sanjay. "National Cyber Security Strategy  and the Emergence of Strong Digital Borders." \i Connections: The Quarterly Journal\i0  19, no. 1 (2020): 73-86.\par \par P\'f6yh\'f6nen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajam\'e4ki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." \i Information & Security: An International Journal\i0  43, no. 2 (2019): 236-256.\par \par Dupuy, Arnold C.. "Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts." \i Information & Security: An International Journal\i0  39, no. 2 (2018): 163-174.\par \par Medvedchuk, Oksana. "Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures." \i Information & Security: An International Journal\i0  40, no. 2 (2018): 129-133.\par \par Skarga-Bandurova, Inna, Alexandr Ryazantsev, and Katerina Kiryushatova. "An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures." \i Information & Security: An International Journal\i0  35, no. 2 (2016): 123-132.\par \par Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." \i Information & Security: An International Journal\i0  33, no. 1 (2015): 13-34.\par \par Milina, Velichka. \i Cybersecurity: A National Strategic Issue\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2013.\par \par Munn\'e9, Ricard. "Future Security Trends and Their Impact from an Industry Point of View." \i Information & Security: An International Journal\i0  29, no. 2 (2013): 147-160.\par \par Brezhnev, Eugene. "An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures." \i Information & Security: An International Journal\i0  28, no. 2 (2012): 199-210.\par \par Sklyar, Vladimir. "Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities." \i Information & Security: An International Journal\i0  28, no. 1 (2012): 98-107.\par \par Androulidakis, Iosif. "PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure." \i Information & Security: An International Journal\i0  28, no. 1 (2012): 89-97.\par \par Tagarev, Todor, Venelin Georgiev, and Valeri Ratchev. "A Taxonomy of Essential Services." \i Radioelectronic and Computer Systems\i0 , no. 58 (2012): 191-196.\par \par Gauthier, Yvan, and Jay Adamsson. "Decision Support Tools for Domestic Security Operations." \i Information & Security: An International Journal\i0  27, no. 2 (2011): 123-137.\par \par Chakarov, Angel. "Welcoming Address." \i Information & Security: An International Journal\i0  24 (2009): 9-10.\par \par Niemeyer, Klaus. "Simulation of Critical Infrastructure." \i Information & Security : An International Journal\i0  17 (2005): 120-143.\par \par Niemeyer, Klaus. "Simulation of Critical Infrastructures." \i Information & Security: An International Journal \i0  17 (2005): 120-143.\par \par }