<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yordan Shterev Ivanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Concepts in Networks and Communication Security and Graph Theory</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">communication technology</style></keyword><keyword><style  face="normal" font="default" size="100%">computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">graph theory</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">205-210 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;In this article, the author presents concepts for exploring networks and com&amp;shy;munication security and recommendations for their use in the definition of requirements, reducing the risk of cyberattacks, and make some quantitative assessments. The focus is on the applications of graph theory in the analysis of communications and information networks.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oksana Pomorova</style></author><author><style face="normal" font="default" size="100%">Sergii Lysenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Formal and Intelligent Methods  for Security and Resilience:  Education and Training Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">B-method</style></keyword><keyword><style  face="normal" font="default" size="100%">computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Formal methods</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resilient system</style></keyword><keyword><style  face="normal" font="default" size="100%">secure protocol</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">software development</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">133-150</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents the results of the implementation of TEMPUS SEREIN project in the Khmelnitsky National University. The main challenge was to develop curriculum and course materials for masters and PhD students. The authors introduce the module description of the course “Formal and Intelligent Methods for Security and Resilience.” The module deals with the issues of development and usage of formal methods for designing secure software systems and implementation of formal methods for assuring security of computer networks. We also present some issues on the usage of intelligent systems for security and address the questions of enhancing systems’ resilience. The implementation of the developed training course will improve the quality of education and will make graduates more successful on the labour market.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">133</style></section></record></records></xml>