<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Borislav Nikolov</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Hygiene Issues in the Naval Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber hygiene</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">main cyber hygiene rules</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">205-218</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the present study, the main characteristics and components of cyber hygiene as a subclass of cybersecurity are discussed. Based on institutional experience in the scope of security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in naval institutions is recommended. Main cyber hygiene definitions are given. Cyber hygiene software issues and institutional information security controls are analyzed. Malware infection as the main cyber hygiene concern is analyzed. Basic cyber hygiene instructions to ensure Internet users stay protected are defined.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">205</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Cybersecurity Issues in the Maritime Industry</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">maritime industry</style></keyword><keyword><style  face="normal" font="default" size="100%">ship’s computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">ship’s cyber defence</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">27-43</style></pages><abstract><style face="normal" font="default" size="100%">The maritime industry with its main components—port logistics, ships, cargo and container distribution systems, autonomous control and navigation systems, global identification and navigation systems—is a substantial and plausible target of cyberattacks. The goal of the present study is to reveal and de-scribe all components of the shipping industry’s cybersecurity policy, the main types of cyberattacks, methods, means, and stages of implementation, cyber vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">big data</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure Protection</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">ICT security</style></keyword><keyword><style  face="normal" font="default" size="100%">IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2020, and summarises the results from five of its sessions: Protecting Critical Infrastructures from Cyberattacks; Security Implications and Solutions for IoT Systems; Big Data and Artificial Intelligence for Cybersecurity; Secure Communication and Information Protection; and Advanced ICT Security Solutions.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record></records></xml>