<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikolay Naydenov Hranov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity for Network Management Systems</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cyber Ecosystem</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Embedded Digital Identity</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid Enterprise Network System</style></keyword><keyword><style  face="normal" font="default" size="100%">Migration/Assimilation System</style></keyword><keyword><style  face="normal" font="default" size="100%">Network System Assimilation</style></keyword><keyword><style  face="normal" font="default" size="100%">Remote Encrypted Connection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">150</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The present research is related to the migration/assimilation system of a hybrid corporate network system with the option of embedded identification, through a remote encrypted connection to a new cybernetic ecosystem, without the active process function ceasing, while the first system is finally assimilated into the new one, while breaking the balance of its cybersecurity.
</style></abstract></record></records></xml>