<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">advanced persistent threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber space</style></keyword><keyword><style  face="normal" font="default" size="100%">human factor</style></keyword><keyword><style  face="normal" font="default" size="100%">proactive identification</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">123-136</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper looks into the issue of proactive advanced persistent threats (APTs) identification in modern social networks. As these threats are quite unnoticeable and require a long-term, comprehensive monitoring of both technologies and users, a hybrid methodological framework is proposed. A combination of: experts&amp;rsquo; knowledge and beliefs, system analysis and real environment interactive validation is presented to meet practical APT challenges. The obtained results provide an explanatory foundation for a better understanding the interaction process of the human factor with future technological developments and resulting threats advances in the evolving cyber space.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">123</style></section></record></records></xml>