<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrative  Approach to Understand Vulnerabilities and Enhance the Security of  Cyber-Bio-Cognitive-Physical Systems</style></title><secondary-title><style face="normal" font="default" size="100%">18th European Conference on Cyber Warfare and Security, ECCWS 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bio-integrated systems</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber-physical system</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision-making</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">System of systems</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">4 -5 July 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">European Conference on Information Warfare and Security, ECCWS</style></publisher><pub-location><style face="normal" font="default" size="100%">Coimbra, Portugal</style></pub-location><volume><style face="normal" font="default" size="100%">2019-July</style></volume><pages><style face="normal" font="default" size="100%">492-500</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Rapid technological advances provide numerous benefits to our ways of work and leisure, banking and transportation, delivery of products and health assistance. The increased interconnectedness among devices, people, networks, and systems, however, introduces a level of complexity surpassing the experience accumulated so far. While the security of communications, network and information systems can be considered a well-established discipline, the study of security of cyber-physical systems is fairly recent. Furthermore, the dependencies of live organisms, including humans, with integrated sensors and electronics, of perceptions and cognition, and variety of drones on influences from cyberspace have been subject of only few, mostly incidental studies. The interdependencies among cyber, physical, biological systems, and humans in situation assessment and decision-making roles create new potential vectors of attack by malicious actors. If exploited, they will lead to cross impact among domains that are usually studied separately. Authors from three Bulgarian institutions, combining research and policy-making experience, embarked on the task to elaborate a comprehensive cybersecurity research agenda. This paper presents their concept for an integrative approach to the exploration of &amp;lsquo;systems of systems.&amp;rsquo; The study is structured along five domains: communications and information systems and networks; cyber-physical system; bio-integrated systems; cognitive processes, i.e. the processes of shaping perceptions, assessing a certain situation and options and making decisions; and drones, remotely controlled or autonomous, the latter case being particularly reliant on advances in artificial intelligence. This paper outlines the problem of vulnerability of each of the five domains to influences from cyber space. Then it presents some advances in cross-domain understanding of vulnerabilities, supported by examples of cybersecurity studies, and provides the outlines of a corresponding, interdisciplinary research agenda, built around the concept of systems of systems. The authors conclude by predicting that the field of cybersecurity will be subject to considerable growth in coming years, requiring multi-and inter-disciplinary competencies and scientific support. &amp;copy; 2019, Curran Associates Inc. All rights reserved.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security and Resilience of Modern Societies: A Research Management Architecture</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bio-integrated systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">drone</style></keyword><keyword><style  face="normal" font="default" size="100%">ERP</style></keyword><keyword><style  face="normal" font="default" size="100%">industrial control systems</style></keyword><keyword><style  face="normal" font="default" size="100%">R&amp;T management</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">systems of systems</style></keyword><keyword><style  face="normal" font="default" size="100%">UxVs</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">38</style></volume><pages><style face="normal" font="default" size="100%">93-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Advanced information and communications technologies (ICT) facilitate the increase of effectiveness and efficiency of defence and security organizations, governmental services, the economy, and quality of life, while at the same time providing opportunities for malicious actors to cause significant damage without exercising physical coercion. Policies for security and resilience of modern societies to threats and risks from the cyberspace account for foreseen cyber threats, their immediate impact on ICT infrastructure, consequent effects on critical services, as well as cascading effects across systems and infrastructures. This paper presents the architecture used to plan and, consequently, manage cybersecurity research in Bulgaria. It covers five application areas (information management systems; industrial control systems; unmanned and remotely piloted vehicles; bio-integrated systems; and cognitive processes and decision-making), the study of systems of systems, and support to the formulation and implementation of cybersecurity policy.</style></abstract><section><style face="normal" font="default" size="100%">93</style></section></record></records></xml>