<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Scala N.M.</style></author><author><style face="normal" font="default" size="100%">Reilly A.C.</style></author><author><style face="normal" font="default" size="100%">Goethals P.L.</style></author><author><style face="normal" font="default" size="100%">Cukier M.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Risk and the Five Hard Problems of Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Risk Analysis </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">2119-2126</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">10</style></issue></record></records></xml>