<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yordan Shterev Ivanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Concepts in Networks and Communication Security and Graph Theory</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">communication technology</style></keyword><keyword><style  face="normal" font="default" size="100%">computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">graph theory</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">205-210 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;In this article, the author presents concepts for exploring networks and com&amp;shy;munication security and recommendations for their use in the definition of requirements, reducing the risk of cyberattacks, and make some quantitative assessments. The focus is on the applications of graph theory in the analysis of communications and information networks.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>