<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Andrew Futter</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">What Does Cyber Arms Control Look Like? Four Principles for Managing Cyber Risk</style></title><secondary-title><style face="normal" font="default" size="100%">Policy Brief</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2020</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.europeanleadershipnetwork.org/policy-brief/what-does-cyber-arms-control-look-like-four-principles-for-managing-cyber-risk/</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">European Leadership Network</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>