<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Recasting the Red Star: Russia Forges Tradition and Technology through Toughness </style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Foreign Military Studies Office</style></publisher><pub-location><style face="normal" font="default" size="100%">Fort Leavenworth, KS</style></pub-location><pages><style face="normal" font="default" size="100%">11</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Nation-State Cyber Strategies: Examples from China and Russia </style></title><secondary-title><style face="normal" font="default" size="100%">Cyberpower and National Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><edition><style face="normal" font="default" size="100%">Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz</style></edition><publisher><style face="normal" font="default" size="100%">Potomac Books</style></publisher><pub-location><style face="normal" font="default" size="100%">Dulles</style></pub-location><pages><style face="normal" font="default" size="100%">477, 486</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Silhouettes: Shadows over the Information Operations</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">KS: Foreign Military Studies Office</style></publisher><pub-location><style face="normal" font="default" size="100%">Fort Leavenworth</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Russia’s Reflexive Control Theory and the Military</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Slavic Military Studies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">www.rit.edu/~cmmc/conferences/2007/ literature/Thomas_2004.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">237–256</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Al Qaeda and the Internet: The Danger of ‘Cyberplanning</style></title><secondary-title><style face="normal" font="default" size="100%">Parameters</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><pages><style face="normal" font="default" size="100%">114-122</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Russian and Chinese Views of Information Warfare</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><pub-location><style face="normal" font="default" size="100%">Washington, D.C. </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy L. Thomas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Preventing Conflict Through Information Technology</style></title><secondary-title><style face="normal" font="default" size="100%">Military Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><volume><style face="normal" font="default" size="100%">78</style></volume><pages><style face="normal" font="default" size="100%">44-57</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">6</style></issue></record></records></xml>