<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrative  Approach to Understand Vulnerabilities and Enhance the Security of  Cyber-Bio-Cognitive-Physical Systems</style></title><secondary-title><style face="normal" font="default" size="100%">18th European Conference on Cyber Warfare and Security, ECCWS 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bio-integrated systems</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber-physical system</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision-making</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">System of systems</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">4 -5 July 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">European Conference on Information Warfare and Security, ECCWS</style></publisher><pub-location><style face="normal" font="default" size="100%">Coimbra, Portugal</style></pub-location><volume><style face="normal" font="default" size="100%">2019-July</style></volume><pages><style face="normal" font="default" size="100%">492-500</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Rapid technological advances provide numerous benefits to our ways of work and leisure, banking and transportation, delivery of products and health assistance. The increased interconnectedness among devices, people, networks, and systems, however, introduces a level of complexity surpassing the experience accumulated so far. While the security of communications, network and information systems can be considered a well-established discipline, the study of security of cyber-physical systems is fairly recent. Furthermore, the dependencies of live organisms, including humans, with integrated sensors and electronics, of perceptions and cognition, and variety of drones on influences from cyberspace have been subject of only few, mostly incidental studies. The interdependencies among cyber, physical, biological systems, and humans in situation assessment and decision-making roles create new potential vectors of attack by malicious actors. If exploited, they will lead to cross impact among domains that are usually studied separately. Authors from three Bulgarian institutions, combining research and policy-making experience, embarked on the task to elaborate a comprehensive cybersecurity research agenda. This paper presents their concept for an integrative approach to the exploration of &amp;lsquo;systems of systems.&amp;rsquo; The study is structured along five domains: communications and information systems and networks; cyber-physical system; bio-integrated systems; cognitive processes, i.e. the processes of shaping perceptions, assessing a certain situation and options and making decisions; and drones, remotely controlled or autonomous, the latter case being particularly reliant on advances in artificial intelligence. This paper outlines the problem of vulnerability of each of the five domains to influences from cyber space. Then it presents some advances in cross-domain understanding of vulnerabilities, supported by examples of cybersecurity studies, and provides the outlines of a corresponding, interdisciplinary research agenda, built around the concept of systems of systems. The authors conclude by predicting that the field of cybersecurity will be subject to considerable growth in coming years, requiring multi-and inter-disciplinary competencies and scientific support. &amp;copy; 2019, Curran Associates Inc. All rights reserved.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Key Issues in the Implementation of the EU Global Strategy and the Evolution of European Defence</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CSDP</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">EU global strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">European defence</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid conflict</style></keyword><keyword><style  face="normal" font="default" size="100%">military ethos</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><number><style face="normal" font="default" size="100%">36</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In his opening remarks to the session on “CSDP and Implementation of the EU Global Strategy” of the Inter-Parliamentary Conference for the Common Foreign and Security Policy and the Common Security and Defence Policy, 15-17 February 2018, Sofia, the author outlines three key issues: The necessary cooperation, and on some matters – close coordination, between the European Union and NATO on defence matters; the need to maintain cohesion and the popular support for the European defence across EU, which requires proportionate and balanced contribution by and inclusion of all member states; and, given the proliferation of roles and missions of the armed forces, the need to remember what constitutes the core of the military profession and making sure that the ethos of the military is preserved.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lachezar Petrov</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">critical information infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber model</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2-6, 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Brunow, Poland</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">National and international security, our financial, industrial as well as economic prosperity, healthcare system and national well-being as a whole are dependent on critical infrastructures, which could be described as highly interdependent. Many examples are available such as the national electrical grid, oil and natural gas systems, telecommunication and information networks, transportation networks, water systems, and banking and financial systems. Keeping them in reliable and secure state and study their dependencies is paramount for every government or organization. There is an urgent need of their classification. Creation and development of model and methodology which could describe their behaviors is going to make this world safer. The presented here model and based on it study and initial results are steps toward reliable and secure critical information infrastructure.</style></abstract></record></records></xml>