<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Burmaka</style></author><author><style face="normal" font="default" size="100%">Nicolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Vitalii Lytvynov</style></author><author><style face="normal" font="default" size="100%">Mariia Dorosh</style></author><author><style face="normal" font="default" size="100%">Svitlana Lytvyn</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proof of Stake for Blockchain Based Distributed Intrusion Detecting System</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing 1265</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><pages><style face="normal" font="default" size="100%">237-247</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Inna V. Stetsenko</style></author><author><style face="normal" font="default" size="100%">Vitalii Lytvynov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computer Virus Propagation Petri-Object Simulation</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing 1019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><pages><style face="normal" font="default" size="100%">103-112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vitalii Lytvynov</style></author><author><style face="normal" font="default" size="100%">Mariia Dorosh</style></author><author><style face="normal" font="default" size="100%">Iryna Bilous</style></author><author><style face="normal" font="default" size="100%">Mariia Voitsekhovska</style></author><author><style face="normal" font="default" size="100%">Valentyn Nekhai</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Development of the automated information system for organization’s information security culture level assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Technical sciences and technologie</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2020</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://ir.stu.cn.ua/123456789/19863</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">124-32</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">19</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nicolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Vitalii Lytvynov</style></author><author><style face="normal" font="default" size="100%">Igor Skiter</style></author><author><style face="normal" font="default" size="100%">Svitlana Lytvyn</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing 1019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><pages><style face="normal" font="default" size="100%">83-95</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>