<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chris Simmons</style></author><author><style face="normal" font="default" size="100%">Charles Ellis</style></author><author><style face="normal" font="default" size="100%">Sajjan Shiva</style></author><author><style face="normal" font="default" size="100%">Dipankar Dasgupta</style></author><author><style face="normal" font="default" size="100%">Qishi Wu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">AVOIDIT: A Cyber Attack Taxonomy</style></title><secondary-title><style face="normal" font="default" size="100%">Technical Report</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">August 2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">CS-09-003</style></number><publisher><style face="normal" font="default" size="100%">University of Memphis</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>