<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>12</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ben Buchanan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber attacks on Ukraine's power grid: to what end?</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.iiss.org/en/topics/cyber-security/cyber-attacks-on-ukraines-power-grid-00d9</style></url></web-urls></urls><number><style face="normal" font="default" size="100%">3 February 2017</style></number><publisher><style face="normal" font="default" size="100%">IISS Cyber security</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Thomas Rid</style></author><author><style face="normal" font="default" size="100%">Ben Buchanan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Attributing Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Strategic Studies </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">38</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1-2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Thomas Rid</style></author><author><style face="normal" font="default" size="100%">Ben Buchanan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Attributing Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Strategic Studies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">38 </style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">30</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Thomas Rid</style></author><author><style face="normal" font="default" size="100%">Ben Buchanan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Attributing Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Strategic Studies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">38 </style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">32</style></issue></record></records></xml>