<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Morozova</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Sokolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Digital Twin</style></keyword><keyword><style  face="normal" font="default" size="100%">DT coverage</style></keyword><keyword><style  face="normal" font="default" size="100%">Industrial IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">Logistics</style></keyword><keyword><style  face="normal" font="default" size="100%">Manufacturing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">125-134</style></pages><abstract><style face="normal" font="default" size="100%">This article presents a Digital Twin (DT) for the logistics system of a manufacturing enterprise using industrial IoT. DT data technology allows to find the required knowledge that can be interpreted and used to support the process of decision-making in the management of the enterprise. The authors propose a classification of DTs for manufacturing and a systematic approach to DT application, as well as its use for simulation of real logistics systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">125</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alexander Kolev</style></author><author><style face="normal" font="default" size="100%">Pavlina Nikolova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Instrumental Equipment for Cyberattack Prevention</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber attack prevention</style></keyword><keyword><style  face="normal" font="default" size="100%">honeypot</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">285-299</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In the paper, the authors discuss some computer security mechanisms and their hardware realization. An overview of well-known cyber-security software solutions has been made. Data on the hardware platforms on which they are intended to be used are given. The authors explore the possibility systems terminologically known as honeypot to be hardware-based on cheap microdevices. The technological and information possibilities for the development of a honeypot network using a modern micro-controller based device are analyzed. The authors focus on the key features of selected devices and describing in detail the conditions by the experiment. Important results for the overall result of the experiment are presented in graphical and tabular form. Conclusions are made about the applicability of micro-controller devices for cyber-security purposes with the application of wireless connectivity and the provision of data about malicious actions over the Internet of Things systems.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">285</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elisaveta Staneva</style></author><author><style face="normal" font="default" size="100%">Mariyan Rachev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Tactical Approach to Cyber Defence in IoT Computer Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">135-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">135</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dobrin Mahlyanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Internet of Things – A New Attack Vector for Hybrid Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attacks against IoT.</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">Security in IoT</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">175-182</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The means of conducting hybrid warfare are rapidly changing. IoT is a recent sphere of activity, opening new opportunities for hybrid influence. Consisting of three main building blocks, IoT inherits all security problem specific to each one of them and introduces some new ones. This article describes in brief the main issues concerning security in IoT and ways of using it for creating hybrid threats. All of the described problems can be used for escalation in different areas. The article presents also a simple definition of what is a (relatively) secure IoT system and an original concept for reducing vulnerabilities in the IoT environment.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sean S. Costigan</style></author><author><style face="normal" font="default" size="100%">Gustav Lindström</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Policy and the Internet of Things</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical infrastructures</style></keyword><keyword><style  face="normal" font="default" size="100%">Industrial Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">machine communications</style></keyword><keyword><style  face="normal" font="default" size="100%">security implications of IoT</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">9-18</style></pages><abstract><style face="normal" font="default" size="100%">Cybersecurity has steadily crept to the top of the national security agenda. Simultaneously, a merger of the physical and virtual worlds is noticeably underway. A confluence of technologies has come together to make this possible under the rubric known as the Internet of Things (IoT). This merger will bring sensors and computing devices totaling in the billions to connect objects together in a network that does not require human intervention, along with which will come much vaunted benefits, knowable risks, uncertainties and considerable security dilemmas. Using the past as a predictor of future behavior, a vast increase in hackable devices will create equally vast vulnerabilities that will now touch the physical world. Yet the IoT will also present opportunities that are just now being imagined, likely making the Internet revolution seem small by comparison. While technological growth often appears to outpace policy, government retains the power to convene and ultimately to regulate. This article examines why policymakers should care about the IoT, the significant trends for the next five to ten years, and likely security implications stemming from those trends. The article finalizes with an overview of policy considerations.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>