<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dobrin Mahlyanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Internet of Things – A New Attack Vector for Hybrid Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attacks against IoT.</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">Security in IoT</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">175-182</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The means of conducting hybrid warfare are rapidly changing. IoT is a recent sphere of activity, opening new opportunities for hybrid influence. Consisting of three main building blocks, IoT inherits all security problem specific to each one of them and introduces some new ones. This article describes in brief the main issues concerning security in IoT and ways of using it for creating hybrid threats. All of the described problems can be used for escalation in different areas. The article presents also a simple definition of what is a (relatively) secure IoT system and an original concept for reducing vulnerabilities in the IoT environment.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>