<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Design of information security systems</style></keyword><keyword><style  face="normal" font="default" size="100%">DLP</style></keyword><keyword><style  face="normal" font="default" size="100%">interactive verification</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-agent modelling &amp; simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">stochastic validation</style></keyword><keyword><style  face="normal" font="default" size="100%">UML architectural meta-design</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">132</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">1-28</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The publication presents an exploration approach for studying data protection in security systems within corporate environment. The approach is including: conceptual UML architecture design, together with further multi-agent system-of-systems modeling and holistic sensitivity analysis. The obtained results are next validated via an ad-hoc stochastic simulation, assuring expert, sensors&amp;rsquo; and machine-generated data flows fusing and usage. Finally, an interactive verification is performed with virtual corporate environment and futuristic, fictitious scenario dynamic observations of both trainees &amp;amp; technologies. An implementation of DLP monitoring for multiple data states and attacks jointly with selected set of users&amp;rsquo; feedback assessments are given in conclusion, assuring comprehensiveness of the obtained results.&lt;/p&gt;</style></abstract></record></records></xml>