<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gergana Mitalova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comprehensive Institutional Approach to Developing Capabilities to Counter Hybrid Threats: Legal and Doctrinal Limitations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capability development</style></keyword><keyword><style  face="normal" font="default" size="100%">collaboration</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">doctrinal limitations</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">legal constraints</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">127-135</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">There are few legal instruments addressing the issue of hybrid conflict and threats. Predominantly, they are laid down in international humanitarian law and are overlooked in the states’ legal systems. Nowadays, a fully new comprehensive institutional approach to the development of capabilities to counter hybrid threats is needed – an approach at multiple levels, multinational and interdisciplinary, intertwining the achievements known so far with up-to-date innovations.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capture the flag</style></keyword><keyword><style  face="normal" font="default" size="100%">collaboration</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">CTF</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">problem-solving</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">95-102</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The importance of cybersecurity in the digital society and our daily lives is becoming increasingly apparent. With the rise of digital reliance, securing information, whether this information is at rest, in transit, or in use, is vital to ensuring the interoperability of systems, including critical infrastructure, on which society’s physical well-being depends. Cryptography is well-known for its role in cybersecurity as a crucial tool for protecting information exchanged via digital devices. 
Cryptography is the science of concealing information so that only the intended parties can read it. As a result, we may generalise that cryptography enables people to communicate via the Internet while securely sending critical and secret information. However, cryptography is a relatively complex combination of mathematics and computer science, where typical learning methodologies may fall short when it comes to achieving hands-on expertise. This paper provides an overview of the possibilities of Capture the Flag (CTF) exercises to test cybersecurity capabilities using collaborative methodologies and cryptographic challenges.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zakaria Maamar</style></author><author><style face="normal" font="default" size="100%">Nabil Sahli</style></author><author><style face="normal" font="default" size="100%">Bernard Moulin</style></author><author><style face="normal" font="default" size="100%">Paul Labbé</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Software Agent-based Collaborative Approach for  Humanitarian-Assistance Scenarios</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collaboration</style></keyword><keyword><style  face="normal" font="default" size="100%">humanitarian operations</style></keyword><keyword><style  face="normal" font="default" size="100%">humanitarian-assistance scenarios</style></keyword><keyword><style  face="normal" font="default" size="100%">Software agent</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">135-155</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents a research project that deals with the use of software agents as a support to collaboration. Collaboration can face different obstacles, such as partner distribution and resource heterogeneity. To overcome these constraints, coordination strategies are required. Such strategies allow agents to avoid conflicts and, hence, to fulfill their activities efficiently. This project is applied to humanitarian-assistance scenarios, in which different participants, such as non-governmental organizations, have to work together despite their individual differences. Therefore, it becomes relevant to suggest collaborative approaches that will support these participants in their daily operations.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>