<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CSIRT Maturity - Self-assessment Tool</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.enisa.europa.eu/topics/csirts-in-europe/csirt-capabilities/csirt-maturity/csirt-maturity-self-assessment-survey</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">NCSS: Practical Guide on Development and Execution</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.enisa.europa.eu/publications/national-cyber-security-strategies-an-implementation-guide</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CSIRT Maturity – Self-assessment Tool</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.enisa.europa.eu/topics/csirts-in-europe/csirt-capabilities/csirt-maturity/csirt-maturity-self-assessment-survey</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Guidelines for Securing the Internet of Things</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.enisa.europa.eu/publications/guidelines-for-securing-the-internet-of-things</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Public Private Partnerships (PPP) – Cooperative Models</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2017</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>12</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Threat-Landscape-Report 2017</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">www.enisa.europa.eu/publications/enisa-threat-landscape-report-2017/at_download/fullReport</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">European Union Agency for Network and Information Security</style></publisher><pub-location><style face="normal" font="default" size="100%">Heraklion</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">National Cyber Security Strategies in the World</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-in-the-world</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ENISA Threat Landscape 2014: Overview of current and emerging cyber-threats</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2014</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS)</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">European Union Agency for Network and Information Security</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proactive Detection of Security Incidents - Honeypots</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><pages><style face="normal" font="default" size="100%">181</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Infrastructures and Services: Maritime</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.enisa.europa.eu/topics/critical-information-infrastructures-and-services/dependencies-of-maritime-transport-to-icts</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">ENISA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Good Practice Guide – Network Security Information Exchanges</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>