<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kenneth Geers</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Strategic Cyber Security</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Cooperative Cyber Defence Center of Excellence</style></publisher><pub-location><style face="normal" font="default" size="100%">Tallinn, Estonia</style></pub-location><pages><style face="normal" font="default" size="100%">10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jose Nazario</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Christian Czosseck</style></author><author><style face="normal" font="default" size="100%">Kenneth Geers</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Politically Motivated Denial of Service Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">The Virtual Battlefield: Perspectives on Cyber Warfare</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Amsterdam: IOS </style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>19</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kenneth Geers</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyberspace and the Changing Nature of Warfare</style></title><secondary-title><style face="normal" font="default" size="100%">SC Magazine</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">27 August 2008</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.scmagazine.com/cyberspace-and-the-changing-nature-of-warfare/article/115929/</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kenneth Geers</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyberspace and the Changing Nature of Warfare</style></title><secondary-title><style face="normal" font="default" size="100%">White paper pre¬sented at the 2008 Black Hat Conference, 7.0</style></secondary-title></titles><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>