<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dafina Zoteva</style></author><author><style face="normal" font="default" size="100%">Peter Vassilev</style></author><author><style face="normal" font="default" size="100%">Lyudmila Todorova</style></author><author><style face="normal" font="default" size="100%">Krassimir Atanassov</style></author><author><style face="normal" font="default" size="100%">Lyubka Doukovska</style></author><author><style face="normal" font="default" size="100%">Valery Tzanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Generalized Net Model of Cyber-control of the Firm’s Dumpers and Crushers</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">data mining</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized net</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper presents generalized net model of a system for tracking and monitoring the movement and actions of a rm&amp;#39;s dumpers and crushers. The model permits analysis regarding possible cyber manipulation of data, and highlights the key vulnerabilities of such systems.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record></records></xml>