<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed Alloghani</style></author><author><style face="normal" font="default" size="100%">Dhiya Al-Jumeily</style></author><author><style face="normal" font="default" size="100%">Abir Hussain</style></author><author><style face="normal" font="default" size="100%">Jamila Mustafina</style></author><author><style face="normal" font="default" size="100%">Thar Baker</style></author><author><style face="normal" font="default" size="100%">Ahmed J. Aljaaf</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities</style></title><secondary-title><style face="normal" font="default" size="100%">Nature-Inspired Computation in Data Mining and Machine Learning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer Natur</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed Alloghani</style></author><author><style face="normal" font="default" size="100%">Dhiya Al-Jumeily</style></author><author><style face="normal" font="default" size="100%">Abir Hussain</style></author><author><style face="normal" font="default" size="100%">Jamila Mustafina</style></author><author><style face="normal" font="default" size="100%">Thar Baker</style></author><author><style face="normal" font="default" size="100%">Ahmed J. Aljaaf</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">Nature-Inspired Computation in Data Mining and Machine Learning. Studies in Computational Intelligence</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>