<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Yavor Papazov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber risk</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threat</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">scalability</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">155-167</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Today’s digital society implies interconnectivity between the online operations of different sectors of everyday life and economy alike. As a consequence, malicious activities targeted towards a single online service could hurt entire indus¬tries and multiple private and public organizations. This interdependence be¬tween online services and economic units is an imperative for targeted efforts ensuring the integrity and availability of individual systems and complex systems-of-systems alike. This article presents MonSys, a flexible, robust, and scalable monitoring platform, implement-ed as a cloud-based service and an on-premise solution, specifically de-signed to ad¬dress the need for ensuring service availability at an individual level. MonSys provides several standardized services availability checks, such as web-based services from multiple geographical locations, and a flexible platform and tools for defining customized complex services. Particular attention is paid to the processes of metrics collection, processing, storage, and querying. MonSys can perform custom availability checks for different types of infrastructures, such as various black-box, grey-box, and white-box availability checks/metrics. The article presents also results from piloting the platform on performance and scalability and options for integration in early-warning and intelligent signaling, based on behavioral pattern analysis and predictive simulations.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">155</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vasil Rizov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Sharing for Cyber Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threat</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threat information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">43-50</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;An organization that has faced an attack acquires valuable information on cyber threats that may be shared with others. This information can help an organization to identify, assess, monitor, and respond to cyber threats. Organizations that share cyber threat information can improve their own security postures as well as those of other organizations. Information sharing among private and public entities is a powerful mechanism to better understand a constantly changing environment and learn in a holistic way about serious risks, vulnerabilities and threats, as well as solutions. This article provides a review of the benefits and challenges of coordinating and sharing cyber threat information, the strengths and weaknesses of different information sharing models, and the importance of building trust between actors and handling sensitive or classified information. Organizations have to establish information sharing goals and scope of information sharing activities, identify cyber threat information sources, develop rules that control the distribution of threat information, and make effective use of threat information in support of their overall cyber security practices.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">43</style></section></record></records></xml>