<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://cyber-risk-lab-uk.netlify.app/</loc><lastmod>2022-04-07T18:06:50+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/event/example/</loc><lastmod>2020-12-29T00:00:10+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publication-type/1/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/5g-security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/authors/</loc><lastmod>2022-04-07T18:06:50+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emmanouil-panaousis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pell2021multi/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publication_types/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/risk-management/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/robert-pell/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/ryan-heartfield/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sotiris-moschoyiannis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tags/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pell2021towards/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publication-type/2/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/antonia-nisioti/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/assessment/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/granadillo2021automated/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/categories/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/caxton-okoh/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-xenakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-forensics/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-risk/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/diana-navarro-llobet/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/dimitrios-papamartzivanos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/game-theory/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/nisioti2021game/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-loukas./</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/gustavo-gonzalez-granadillo/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/healthcare/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/category/journal/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/management/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/mitre/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/ramon-romeu/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sofia-anna-menesidou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sokratis-nifakos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/stefan-rass/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/charoula-konstantina-nikolaou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/nifakos2021influence/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/krishna-chandramouli/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/panagiotis-papachristou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sabine-koch/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/stefano-bonacina/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/aristeidis-farao/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panda2021cyber/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sakshyam-panda/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/security-economics/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/aron-laszka/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/nisioti2021data/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/securitybudget/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/post/20-12-02-icml-best-paper/</loc><lastmod>2020-12-02T19:26:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/post/20-12-01-wowchemy-prize/</loc><lastmod>2020-12-02T19:26:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/anatolij-bezemskij/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/privacy/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/heartfield2020self/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emily-kate-parsons/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/parsons2020how/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/iot-security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/risk-modelling/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/alex-alexandridis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/and-dimitrios-d.-vergados/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/dionisis-kandris/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/kandris2020multiobjective/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/optimization/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tasos-dagiuklas/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/wireless/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/artificial-intelligence/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/chai/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/liu/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/optimisation/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/radoglou2020aries/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/georgios-efstathopoulos/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/intrusion-detection/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/machine-learning/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/panagiotis-radoglou-grammatikis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/panagiotis-sarigiannidis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/andrew-fielder/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/entso-veliou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/farnaz-mohammadi/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-kalatzantonakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/john-polley/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/michael-sirivianos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/michalis-pingos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nikolaos-episkopos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nikolaos-georgopoulos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nikos-salamanos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/farao2020secondo/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/spyros-loizou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/cui2020cache/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/category/conference/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cryptography/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/zhou2020deep/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/fei-gao/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/hua-zhang/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/junjiong-li/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/junwei-zhou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/kaitai-liang/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/learning/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/qiaoyan-wen/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/wenmin-li/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/yijie-shi/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/yuanbo-cui/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/guangquan-xu/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/iot/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/litao-jiao/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/meiqi-feng/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/si-chen/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/trust/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/xu2020ttsvd/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/xi-zheng/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/yuyang-zhao/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/zhong-ji/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/cui2020efficient/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/wei-yin/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/ali-jaddoa/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/jaddoa2020dynamic/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/georgia-sakellari/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/panagiotis-g.-sarigiannidis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/jiageng-chen/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/jiahui-chen/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/jianting-ning/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/jie-ling/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/chen2020post/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/merit/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-theodorakopoulos/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/theodorakopoulos2020fly/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-laoudias/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panda2020optimizing/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/xu2019dt/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/hao-wang/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/xiaotong-li/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/yao-zhang/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pitropakis2019taxonomy/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-insurance/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cybersecurity/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/daniel-w.-woods/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/eleftherios-anastasiadis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nikolaos-pitropakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panda2019post/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/thanassis-giannetsos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/advanced-persistent-threats/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/attack-graph/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/rass2019cut/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-physical-systems/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/boumkheld2019honeypot/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/honeypots/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nadia-boumkheld/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sandra-konig/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/smart-grid/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/angeliki-panou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/chao-shen/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christoforos-ntantogian/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/mohammadi2019curex/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-risk-control/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/phdncsc/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/eirini-karapistoli/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/moschoyiannis/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/schneider/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tao-li/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/li2019using/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/wei-wang/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/xiao-ming-li/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/bolgouras2019distributed/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/key-management/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/peer-to-peer/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/vaios-bolgouras/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/andrew-fish/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/mavropoulos2019apparatus/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-kalloniatis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/haralambos-mouratidis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/orestis-mavropoulos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/radoglou2019attacking/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emmanouil-kafetzakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/ioannis-giannoulakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/risk-control/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/he2019new/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/kai-he/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/xinyi-huang/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/yijun-mao/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/changxiang-shen/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/naixue-xiong/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/ning2019taw/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/yongli-yang/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/zhenhu-ning/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/loukas2019taxonomy/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tuan-vuong/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/lu2019quantum/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/xiuhua-lu/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/zhengping-jin/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/secondo/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/curex/</loc><lastmod>2021-04-24T07:34:05+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/laszka2018cyber/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/jens-grossklags/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/alkiviadis-giannakoulias/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pitropakis2018enhanced/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/attack-attribution/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-kalpakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/michalis-pavlidis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/myrsini-athinaiou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/panayiotis-sarigiannidis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/rodrigo-diaz-rodriguez/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/security-requirements-engineering/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/theo-fotis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/athinaiou2018towards/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/clive-cheong-took/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nikhil-banerjee/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/banerjee2018unsupervised/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/fielder2018risk/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/stefan-schauer/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/spear/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/chronopoulos2017options/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/michail-chronopoulos/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/kandris2017coala/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-tselikis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nikolaos-argyropoulos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pavlidis2017selecting/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/mavropoulos2016apparatus/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/mavropoulos2017asto/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/haralambos-mouratidisandrew-fish/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/mavropoulos2017conceptual/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/carlton-shepherd/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/eibe-frank/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/iakovos-gurulian/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/keith-mayes/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/konstantinos-markantonakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/raja-naeem-akram/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/shepherd2017applicability/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/ioannis-d.-moscholios/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/michael-d.-logothetis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/vassilakis2017security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/vassilios-g.-vassilakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/anastasios-a.-economides/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2017game/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/hadeer-elsemary/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/mhr-khuzani/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tansu-alpcan/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/adeyinka-adedoyin/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/case-based-reasoning/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/adedoyin2016evaluating/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/fraud-detection/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/miltos-petridis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/stelios-kapetanakis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/vassilakis2016security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/chris-hankin/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/fielder2016decision/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/fabrizio-smeraldi/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/pasquale-malacaria/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/andreas-noack/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2015game/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/johannes-pohl/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/rontidis2015game/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/cyber-risk-management/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-rontidis/</loc><lastmod>2021-04-23T23:41:56+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/hossein-fereidooni/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/mauro-conti/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2014secure/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/and-fabrizio-smeraldi/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2014cybersecurity/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/fielder2014game/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-politis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/ramrekha2013standardisation/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tipu-a-ramrekha/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pfluegel2013probabilistic/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/eckhard-pfluegel/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/emergency-communications/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/grant-millar/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/network-security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2012secure/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tipu-arvind-ramrekha/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-p-papageorgiou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/konstantinos-birkos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2012security/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/tsitsigkos2012case/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/alkiviadis-tsitsigkos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/arvind-ramrekha/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/fariborz-entezami/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/millar2012distributed/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/helena-rifa-pous/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/rifa2012recipients/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/farrukh-ehtisham/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/ehtisham2011performance/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2010testbed/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-drew/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/ramrekha2010chameleon/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/millar2010robust/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2010secure/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2010adaptive/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/nazaryan2010end/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/levon-nazaryan/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2009framework/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2009game/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-papageorgiou/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/cong-thien-nguyen-and-corrine-sieux-and-christos-politis-and-tasos-dagiuklas/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-matthew/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/vahid-talooki/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2009securing/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/pirmoradian2010efficient/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emmanouil-a.-panaousis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-c.-polyzos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/mahdi-pirmoradian/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2009maximizing/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christopher-ververidis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-polyzos/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/panaousis2008optimizing/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/pantelis-frangoudis/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/admin/</loc><lastmod>2021-02-10T00:06:53+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/contact/</loc><lastmod>2020-12-02T19:26:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/people/</loc><lastmod>2020-12-02T19:26:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/adrian-coutsoftides/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/andreea-firoozbakht/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/antonia-nisioti/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/aris-farao/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/aron-laszka/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/asimina-vasalou/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/cameron-noakes/</loc><lastmod>2022-04-07T18:06:50+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/caxton-okoh/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/charalampos-xanthopoulakis/</loc><lastmod>2021-08-14T12:41:20+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/chris-hankin/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/christos-xenakis/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/claire-stretch/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/dmitry-fedorenko/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emily-parsons/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emma-scott/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/emmanouil-manos-panaousis/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/etienne-roesch/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-loukas/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-paparis/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/george-rontidis/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/tag/iot/cps/</loc></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/kaitai-liang/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/kokulan-natkunam/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/post/</loc><lastmod>2020-12-02T19:26:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/michail-chronopoulos/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/muhammad-usman/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/nadia-boumkheld/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/orestis-mavropoulos/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/pasquale-malacaria/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/projects/</loc><lastmod>2021-04-23T23:36:37+01:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/publications/</loc><lastmod>2021-11-05T14:02:03+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/event/</loc><lastmod>2020-12-29T00:00:10+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/rob-pell/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/sakshyam-panda/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/tansu-alpcan/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url><url><loc>https://cyber-risk-lab-uk.netlify.app/author/vasileios-vasilakis/</loc><lastmod>2021-11-05T13:57:55+00:00</lastmod></url></urlset>