<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolay Naydenov Hranov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluation techniques for cyber threats in network management systems</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">identification/assessment techniques</style></keyword><keyword><style  face="normal" font="default" size="100%">network management systems</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2023</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">151</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In a world where people are completely dependent on computer technology and information systems, the protection of information is of critical importance. The study presents an overview of some popular solutions for technical assessment of cyber threats in a risky, &quot;sensitive&quot; information environment, namely network management systems.</style></abstract></record></records></xml>