<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arnold C. Dupuy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-energy nexus</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Interagency</style></keyword><keyword><style  face="normal" font="default" size="100%">international cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">joint mission assurance assessments</style></keyword><keyword><style  face="normal" font="default" size="100%">non-linear warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">operational energy context</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">163-174</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The energy sector has long been recognized as critical infrastructure, particularly vulnerable to external penetration and manipulation by hostile elements. The cyber-energy nexus was chosen as the case study for this article. It highlights the growing vulnerabilities of the energy infrastructure to cyber threats and aims to move forward dialogue, mainly from the perspective of the US Department of Defense (DoD), on protecting DoD energy infrastructure from a variety of hybrid tools.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>