<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.acigjournal.com/Letter-From-The-Editor-In-Chief,184278,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184278-105037?filename=105037.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Substantive-Criminal-Aspects-of-the-Offence-of-Simulated-Child-Pornography-under,184279,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184279-105038?filename=105038.pdf</loc></url><url><loc>https://www.acigjournal.com/Artificial-Intelligence-for-Cybersecurity-Offensive-Tactics-Mitigation-Techniques,184280,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184280-105039?filename=105039.pdf</loc></url><url><loc>https://www.acigjournal.com/Utilizing-Object-Capabilities-to-Improve-Web-Application-Security,184282,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184282-105040?filename=105040.pdf</loc></url><url><loc>https://www.acigjournal.com/Commentary-The-Czech-Approach-to-Supply-Chain-Security-in-ICT,184283,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184283-105041?filename=105041.pdf</loc></url><url><loc>https://www.acigjournal.com/Russian-Aggression-against-Ukraine-as-the-Accelerator-in-the-Systemic-Struggle-against,184284,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184284-105042?filename=105042.pdf</loc></url><url><loc>https://www.acigjournal.com/Digital-Sovereignty-Strategies-for-Every-Nation,184285,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184285-105043?filename=105043.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Tragedy-of-Smart-Cities-in-Egypt-How-the-Smart-City-is-Used-towards-Political,184286,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184286-105044?filename=105044.pdf</loc></url><url><loc>https://www.acigjournal.com/UK-Border-Digitalisation-a-Commentary-on-the-Current-State-of-Affairs,184287,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184287-105045?filename=105045.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Il-legitimacy-of-Cybersecurity-An-Application-of-Just-Securitization-Theory-to,184288,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184288-105046?filename=105046.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Cybersecurity-Obligations-of-States-Perceived-as-Platforms-Are-Current-European,184289,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184289-105047?filename=105047.pdf</loc></url><url><loc>https://www.acigjournal.com/Utopia-Lost-Human-Rights-in-a-Digital-World,184290,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184290-105048?filename=105048.pdf</loc></url><url><loc>https://www.acigjournal.com/How-Are-Czech-Individuals-Willing-to-Protect-Themselves-A-Comparison-of-Cyber-and,184291,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184291-105049?filename=105049.pdf</loc></url><url><loc>https://www.acigjournal.com/Towards-an-Efficient-and-Coherent-Regulatory-Framework-on-Cybersecurity-in-the-EU,184292,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184292-105050?filename=105050.pdf</loc></url><url><loc>https://www.acigjournal.com/Privacy-on-the-Internet-An-Empirical-Study-of-Poles-Attitudes,184293,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184293-105051?filename=105051.pdf</loc></url><url><loc>https://www.acigjournal.com/NoPASARAN-a-Novel-Platform-for-Analysing-Semi-Active-elements-in-Routes-Across-a,184294,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184294-105052?filename=105052.pdf</loc></url><url><loc>https://www.acigjournal.com/Cybersecurity-is-more-than-a-Technological-Matter-Towards-Considering-Critical-Infrastructures,184295,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184295-105053?filename=105053.pdf</loc></url><url><loc>https://www.acigjournal.com/Predictive-Modelling-of-a-Honeypot-System-Based-on-a-Markov-Decision-Process-and,184296,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184296-105054?filename=105054.pdf</loc></url><url><loc>https://www.acigjournal.com/Shielding-the-Spanish-Cyberspace-An-Interview-with-Spain-s-National-Cryptologic-Centre,184297,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184297-105055?filename=105055.pdf</loc></url><url><loc>https://www.acigjournal.com/State-level-Cyber-Resilience-A-Conceptual-Framework,184298,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184298-105056?filename=105056.pdf</loc></url><url><loc>https://www.acigjournal.com/Guerre-a-la-Carte-Cyber-Information-Cognitive-Warfare-and-the-Metaverse,184299,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184299-105057?filename=105057.pdf</loc></url><url><loc>https://www.acigjournal.com/Creating-a-Repeatable-Nontechnical-Skills-Curriculum-for-the-University-of-Southern,184300,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184300-105058?filename=105058.pdf</loc></url><url><loc>https://www.acigjournal.com/Cyberwarfare-against-Critical-Infrastructures-Russia-and-Iran-in-the-Gray-Zone,184301,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184301-105059?filename=105059.pdf</loc></url><url><loc>https://www.acigjournal.com/Regulating-Deep-Fakes-in-the-Artificial-Intelligence-Act,184302,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184302-105060?filename=105060.pdf</loc></url><url><loc>https://www.acigjournal.com/Structured-Field-Coding-and-its-Applications-to-National-Risk-and-Cybersecurity-Assessments,184303,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184303-108189?filename=108189.pdf</loc></url><url><loc>https://www.acigjournal.com/Tell-Me-Where-You-Live-and-I-Will-Tell-Your-P-Ssw0rd-Understanding-the-Macrosocial,184304,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184304-105062?filename=105062.pdf</loc></url><url><loc>https://www.acigjournal.com/Examining-Supply-Chain-Risks-in-Autonomous-Weapon-Systems-and-Artificial-Intelligence,184305,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184305-105063?filename=105063.pdf</loc></url><url><loc>https://www.acigjournal.com/Artificial-Immune-Systems-in-Local-and-Network-Cybersecurity-An-Overview-of-Intrusion,184306,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184306-105064?filename=105064.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Russia-Ukraine-Conflict-from-2014-to-2023-and-the-Significance-of-a-Strategic,184308,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184308-105065?filename=105065.pdf</loc></url><url><loc>https://www.acigjournal.com/Trust-Framework-on-Exploitation-of-Humans-as-the-Weakest-Link-in-Cybersecurity,184310,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184310-105066?filename=105066.pdf</loc></url><url><loc>https://www.acigjournal.com/Protection-of-the-EU-s-Critical-Infrastructures-Results-and-Challenges,184311,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-184311-105067?filename=105067.pdf</loc></url><url><loc>https://www.acigjournal.com/Letter-from-the-Editor-in-Chief,186692,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-186692-107645?filename=107645.pdf</loc></url><url><loc>https://www.acigjournal.com/Moscow-and-the-World-From-Soviet-Active-Measures-to-Russian-Information-Warfare,187619,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-187619-112697?filename=112697.pdf</loc></url><url><loc>https://www.acigjournal.com/Russia-s-Cyber-Campaigns-and-the-Ukraine-War-From-the-Gray-Zone-to-the-Red-Zone-,189358,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-189358-112696?filename=112696.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Use-of-Cyber-Tools-by-the-Russian-Military-Lessons-from-the-War-against-Ukraine,190142,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190142-112703?filename=112703.pdf</loc></url><url><loc>https://www.acigjournal.com/Cyber-Influence-Defense-Applying-the-DISARM-Framework-to-a-Cognitive-Hacking-Case,190196,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190196-112700?filename=112700.pdf</loc></url><url><loc>https://www.acigjournal.com/Collaborating-Pariahs-Does-the-Ukraine-War-Cement-an-Adversarial-Cyber-Information,190263,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190263-112698?filename=112698.pdf</loc></url><url><loc>https://www.acigjournal.com/Vulnerability-of-Students-of-Masaryk-University-to-Two-Different-Types-of-Phishing,190268,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190268-124470?filename=124470.pdf</loc></url><url><loc>https://www.acigjournal.com/Military-Situation-Awareness-Ukrainian-Experience,190341,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190341-112702?filename=112702.pdf</loc></url><url><loc>https://www.acigjournal.com/Investment-in-Cybersecurity-Companies-in-Times-of-Political-and-Economic-Instability,190342,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190342-112704?filename=112704.pdf</loc></url><url><loc>https://www.acigjournal.com/Assessment-of-the-Cybersecurity-of-Ukrainian-Public-Companies-Listed-on-the-Warsaw,190343,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190343-112706?filename=112706.pdf</loc></url><url><loc>https://www.acigjournal.com/Stronger-together-EU-Support-for-Ukrainian-Local-Authorities-Facing-Cyber-Attacks,190344,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190344-112707?filename=112707.pdf</loc></url><url><loc>https://www.acigjournal.com/Methodology-of-Quantitative-Assessment-of-Network-Cyber-Threats-Using-a-Risk-Based,190345,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190345-112708?filename=112708.pdf</loc></url><url><loc>https://www.acigjournal.com/Russia-s-Invasion-of-Ukraine-and-National-Cyber-Security-Strategies-Quantitative,190346,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190346-112710?filename=112710.pdf</loc></url><url><loc>https://www.acigjournal.com/Understanding-Estonia-s-Cyber-Support-for-Ukraine-Building-Resilience-Not-Status,190396,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190396-112699?filename=112699.pdf</loc></url><url><loc>https://www.acigjournal.com/Post-Truth-and-Information-Warfare-in-their-Technological-Context,190407,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190407-124463?filename=124463.pdf</loc></url><url><loc>https://www.acigjournal.com/Assessing-Power-and-Hierarchy-in-Cyberspace-An-Approach-of-Power-Transition-Theory,190481,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190481-124460?filename=124460.pdf</loc></url><url><loc>https://www.acigjournal.com/Denmark-s-Sector-Responsibility-Principle-A-Tedious-Cyber-Resilience-Strategy,190789,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-190789-124469?filename=124469.pdf</loc></url><url><loc>https://www.acigjournal.com/Introduction-to-Special-Issue-on-The-Russian-Ukrainian-War-Effects-on-Global-Cybersecurity,191475,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-191475-112695?filename=112695.pdf</loc></url><url><loc>https://www.acigjournal.com/An-Analysis-of-Cybersecurity-Policy-Compliance-in-Organisations,191942,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-191942-124472?filename=124472.pdf</loc></url><url><loc>https://www.acigjournal.com/Redefining-Systemic-Cybersecurity-Risk-in-Interconnected-Environments,192119,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-192119-124465?filename=124465.pdf</loc></url><url><loc>https://www.acigjournal.com/Disjointed-Cyber-Warfare-Internal-Conflicts-among-Russian-Intelligence-Agencies,192120,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-192120-124462?filename=124462.pdf</loc></url><url><loc>https://www.acigjournal.com/Ransomware-Why-It-s-Growing-and-How-to-Curb-Its-Growth,192959,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-192959-124461?filename=124461.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Future-of-Security-Empowerment-and-the-Evolving-Methodologies-Essential-to-Counter,199341,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-199341-124459?filename=124459.pdf</loc></url><url><loc>https://www.acigjournal.com/Exploiting-Human-Trust-in-Cybersecurity-Which-Trust-Development-Process-Is-Predominant,199452,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-199452-124468?filename=124468.pdf</loc></url><url><loc>https://www.acigjournal.com/Vulnerabilities-of-Web-Applications-Good-Practices-and-New-Trends,199521,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-199521-124464?filename=124464.pdf</loc></url><url><loc>https://www.acigjournal.com/Enhancing-Secure-Key-Management-Techniques-for-Optimised-5G-Network-Slicing-Security,199725,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-199725-124466?filename=124466.pdf</loc></url><url><loc>https://www.acigjournal.com/AI-in-Disinformation-Detection,200200,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-200200-124467?filename=124467.pdf</loc></url><url><loc>https://www.acigjournal.com/Deepfake-Influence-Tactics-through-the-Lens-of-Cialdini-s-Principles-Case-Studies,201147,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-201147-124471?filename=124471.pdf</loc></url><url><loc>https://www.acigjournal.com/Jobs-Exposure-to-Generative-AI-Ongoing-Study-by-NASK-PIB-and-ILO,201152,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-201152-124473?filename=124473.pdf</loc></url><url><loc>https://www.acigjournal.com/Targeting-the-Weak-Exploring-Transnational-Digital-Repression,203788,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-203788-125034?filename=125034.pdf</loc></url><url><loc>https://www.acigjournal.com/AI-Powered-Pervasive-Computing-Discerning-Threat-Model-to-Unveil-Security-and-Privacy,207029,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-207029-126884?filename=126884.pdf</loc></url><url><loc>https://www.acigjournal.com/Building-Trustworthy-Autonomous-AI-Essential-Principles-beyond-Traditional-Software,208710,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-208710-128314?filename=128314.pdf</loc></url><url><loc>https://www.acigjournal.com/Information-Sovereignty-under-Fire-Legal-Challenges-for-Ukraine,209993,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-209993-131569?filename=131569.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Role-of-Cybersecurity-in-Addressing-Express-Kidnappings-Challenges-and-Innovative,210222,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-210222-130844?filename=130844.pdf</loc></url><url><loc>https://www.acigjournal.com/Improving-Threat-Detection-in-Information-Security-with-Ensemble-Learning,210525,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-210525-130296?filename=130296.pdf</loc></url><url><loc>https://www.acigjournal.com/Problematisation-Analytics-New-Foucauldian-Direction-in-Theory-and-Method-for-Cybersecurity,210682,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-210682-130845?filename=130845.pdf</loc></url><url><loc>https://www.acigjournal.com/Cyber-Threats-and-Vulnerability-Mapping-in-the-Energy-Sector-Laying-the-Groundwork,211124,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-211124-131512?filename=131512.pdf</loc></url><url><loc>https://www.acigjournal.com/Transforming-the-Intelligence-Cycle-through-Adapting-to-Complex-Environments-and,211788,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-211788-132027?filename=132027.pdf</loc></url><url><loc>https://www.acigjournal.com/Supply-Chain-Security-and-AI-Risk-Governance-Model-for-Critical-Infrastructure-under,211823,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-211823-132874?filename=132874.pdf</loc></url><url><loc>https://www.acigjournal.com/Vulnerability-Coordination-under-the-Cyber-Resilience-Act,213350,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-213350-132210?filename=132210.pdf</loc></url><url><loc>https://www.acigjournal.com/The-Impact-of-Data-Governance-on-Data-Management-in-the-South-African-Construction,213473,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-213473-133703?filename=133703.pdf</loc></url><url><loc>https://www.acigjournal.com/Challenges-in-DevSecOps-Decision-Making-amid-a-Dearth-of-Valid-Frameworks,213726,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-213726-132783?filename=132783.pdf</loc></url><url><loc>https://www.acigjournal.com/Social-Cybersecurity-as-Digital-Resilience-The-STRIDE-Framework-for-Countering-AI,213864,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-213864-133112?filename=133112.pdf</loc></url><url><loc>https://www.acigjournal.com/SAE-AM-Enhancing-Network-Intrusion-Detection-Using-Sparse-Autoencoders-with-Attention,213872,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-213872-133704?filename=133704.pdf</loc></url><url><loc>https://www.acigjournal.com/Cognitive-Warfare-Disinformation-and-Corporate-Influence-in-Europe-s-Energy-nTransition,214045,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-214045-133028?filename=133028.pdf</loc></url><url><loc>https://www.acigjournal.com/A-Grounded-Theory-of-SME-Resilience-in-Network-Information-Security,215056,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-215056-135395?filename=135395.pdf</loc></url><url><loc>https://www.acigjournal.com/Artificial-Intelligence-Propaganda-Factories-with-Language-Models,215416,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-215416-136013?filename=136013.pdf</loc></url><url><loc>https://www.acigjournal.com/Letter-from-Editor-in-Chief,217227,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-217227-135278?filename=135278.pdf</loc></url><url><loc>https://www.acigjournal.com/Of-AI-Machine-and-Human-Labour-An-Integrated-Nexus-of-Work-Operating-System-Architecture,217714,0,2.html</loc></url><url><loc>https://www.acigjournal.com/pdf-217714-137881?filename=137881.pdf</loc></url></urlset>