<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">AI-driven Cybersecurity Solutions, Cyber Ranges for Education &amp; Training, and ICT Applications for Military Purposes</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative network organisation</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity ethics</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Third International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2021, and summarises the results from four of its sessions: AI-driven Cybersecurity Solutions; Organisational and Ethical Considerations in Providing Cybersecurity; Cyber Ranges for Innovative Education &amp; Training; and Advanced ICT Solutions with Military Applications.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ICT Governance, Human Factors and Cyber Situational Awareness</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Editorial</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">situaitonal awareness</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The article summarises the results from the four sessions during the Second International Scientific Conference Digital Transformation, Cyber Security and Resilience DIGILIENCE 2020. These are ICT Governance and Management for Digital Transformation, Cyber Situational Awareness and Information Exchange, Human Systems Integration Approach to Cybersecurity and Education and Training for Cyber Resilience.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alfredo M. Ronchi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">TAS: Trust Assessment System</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">big data</style></keyword><keyword><style  face="normal" font="default" size="100%">border security</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk Assessment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">44</style></volume><pages><style face="normal" font="default" size="100%">62-75</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The present article briefly introduces a general view on tomorrow’s border control system and EU inter-BCP real time information sharing, exploring and proposing new operational methods and solutions for border control procedures to increase the efficacy and efficiency of the whole security screening system at the same time reducing the efforts (costs/resources). The general description of the system logic and architecture introduces the core of the solution, the Trust Assessment System. A “black box” based on risk analysis and advanced machine learning algorithms aimed to assign a Traveller Trust Score to each single individual intending to cross the border. Main benefits are: improved checkpoint throughput, improved situational awareness and level of security, better traveller experience, optimisation of resources. The concept is that the traveller risk evaluation starts as soon as she/he applies for a visa, a passport or books a trip by whatever means of transport.</style></abstract><section><style face="normal" font="default" size="100%">62</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">DIGILIENCE - A Platform for Digital Transformation,  Cyber Security and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">DIGILIENCE</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">emerging technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid influence</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">intuitionist fuzzy logic</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The ongoing digital transformation requires significant investments and innovation to provide security of cyberspace and variety of critical infrastructures and essential services that increasingly depend on the digital infrastructure, as well as to enhance the resilience of organizations, communities, industries, nations, and alliances in the face of malicious use of cyberspace.&lt;/p&gt;&lt;p&gt;This volume presents 28 of the papers, accepted for presentation at the DIGILIENCE 2019 conference, dealing with cyber information sharing and situational awareness, the benefits and challenges of emerging technologies, such as artificial intelligence, the human factor, education and training for cyber security and resilience, the need to incorporate the cybersecurity efforts into the search for effective and efficient exploitation of information technologies, policies and solutions for security and resilience of Industry 4.0 and critical infrastructures, analysing and countering hybrid influence through social networks and more traditional media. The DIGILIENCE series of conferences will promote the sharing of knowledge and experience and facilitate the spread of good practice in IT governance, cyber security and resilience.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kirsi Aaltola</style></author><author><style face="normal" font="default" size="100%">Petteri Taitto</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">education and training</style></keyword><keyword><style  face="normal" font="default" size="100%">exercises</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational learning</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">123-133</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Development of information technology and the globalization require constant investment in people. New and emerging technologies such as autonomous systems, machine learning and AI radically re-contextualize the human dimension of the organization. Strategic changes have revealed new critical vulnerabilities such as social media-based election meddling and disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Education and training raise the level of expertise, skills and competences and ensure better performance in complex cyber situations. Researchers have addressed assumptions, models, concepts and cognitive aspects of human performance in the cyber domain. However, the theories and approaches of human learning in training and exercises are only partly touched. New techniques for enhancing organizational cyber resilience to cyber-attacks are needed and they still lack sound theoretical foundations.&lt;/p&gt;&lt;p&gt;This article aims to advance the discussion suggesting viewpoints on training and exercises in the cyber domain, taking into consideration specifics of skills in cyber security. It provides overview of theories of learning to better support human performance. Our critical interpretation enhances the comprehensive understanding of decision-making, learning theories, and design of cyber security training and exercises. Furthermore, our intention is to constructively promote discussion on current issues about human learning in cyber training and education and thus boost multidisciplinary studies to enhance cyber awareness.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">123</style></section></record></records></xml>