<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hybrid Warfare: Emerging Research Topics</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">complexity</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">interdisciplinary research</style></keyword><keyword><style  face="normal" font="default" size="100%">multidisciplinary studies</style></keyword><keyword><style  face="normal" font="default" size="100%">nonlinearity</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">289-300</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article elaborates on four emerging research topics, considered of key importance for the understanding of and finding effective countermeasures to hybrid threats: (1) exploring the interlinked dynamics of a conflict developing in parallel in the physical world and on social networks; (2) analysing the expanding involvement of private actors who serve as proxies for an assertive state; (3) exploring the vulnerabilities of national security systems to hybrid influence and finding effective countermeasures; and (4) designing an architecture that allows to study the problem of hybrid threats holistically by providing interoperability among domain-specific or cross-domain models, or ‘use cases,’ and the respective data. All these require multi- and interdisciplinary research and consistent accumulation, verification and sharing of data, case studies and models.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record></records></xml>