<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Pavlin Kutinchev</style></author><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Top 10 live threats to cyberspace in 2019</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">digital future</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized landscape of significance</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed digital reality</style></keyword><keyword><style  face="normal" font="default" size="100%">top 10 live threats</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2019</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">133</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">1-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The outlined overviews in the present study are aiming to mark the key assets for development of threats in the cyberspace for 2019. The major trend is outlining a priority role for cyberattacks on innovative technological solutions, concerning cloud services, smart mobiles and IoTs that are addressed by different malware activities and negative attempts from human factor, hardware and software perspectives in the mixed digital reality of the future. Encompassing at the same time both social and heterogeneous communicational smart networks with the active role of the humans. Additional accent is expected to emerge also from the regulations and policies for personal and corporate data, systems and services protection.&lt;/p&gt;</style></abstract></record></records></xml>