<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>bm4cs-papers</Name><Prefix></Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>blobs/</Key><LastModified>2023-03-05T09:42:26.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>blobs/OperatorMono.zip</Key><LastModified>2023-03-05T09:45:44.000Z</LastModified><ETag>&quot;d87f53ad8a495cd76949d73eb5fcc155&quot;</ETag><Size>273922</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/</Key><LastModified>2022-04-12T11:01:46.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/assurance/</Key><LastModified>2023-03-05T05:32:27.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/assurance/Ayo_2016_InformationSecurityRisksAssessmentCaseStudy.pdf</Key><LastModified>2023-03-05T05:39:45.000Z</LastModified><ETag>&quot;7f21c9497364ef135afce3b2b7cecafa&quot;</ETag><Size>899234</Size><Owner><ID>a45d6e1b089ad9e1509bec73c1e86486fe06a0ec535da699f16b049cfbba85e1</ID></Owner><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/assurance/Braeuer_2015_ATMSecurityACaseStudyOfLogicalRiskAssessment.pdf</Key><LastModified>2023-03-05T05:39:46.000Z</LastModified><ETag>&quot;44aa93a3879ce1df66ab06ec396da381&quot;</ETag><Size>350933</Size><Owner><ID>a45d6e1b089ad9e1509bec73c1e86486fe06a0ec535da699f16b049cfbba85e1</ID></Owner><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/assurance/NIST_2020_CaseStudiesInCyberSupplyChainRiskManagement_ObservationsAndInterviewsFromIndustry.pdf</Key><LastModified>2023-03-05T05:39:48.000Z</LastModified><ETag>&quot;da35c6509b34268aabfe2daf922ccb90&quot;</ETag><Size>393614</Size><Owner><ID>a45d6e1b089ad9e1509bec73c1e86486fe06a0ec535da699f16b049cfbba85e1</ID></Owner><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/</Key><LastModified>2022-04-12T11:02:19.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/Al-Hawawreh_2020_DeepLearningEnabledThreatIntelligenceSchemeInTheInternetOfThingsNetworks.pdf</Key><LastModified>2022-04-12T11:03:05.000Z</LastModified><ETag>&quot;13c4c389d7ac1562cee8a5e37435d350&quot;</ETag><Size>9424333</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/Bakhshi_2018_IndustrialInternetOfThingsSecurityThreatsByConsideringCiscoAndMicrosoftReferenceModels.pdf</Key><LastModified>2022-04-12T11:03:10.000Z</LastModified><ETag>&quot;b8ef17145b1e4e31a2fe034e9bd08914&quot;</ETag><Size>238300</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/Easttom_2020_NICECyberSecurityFramework_VulnerabilityAssessmentAndManagement.pdf</Key><LastModified>2022-04-12T11:03:17.000Z</LastModified><ETag>&quot;26f05d2c74ac6248083eeb9b5019d521&quot;</ETag><Size>1609473</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/Moustafa_2018_ANewThreatIntelligenceSchemeForSafeguardingIndustry4Systems.pdf</Key><LastModified>2022-04-12T11:03:26.000Z</LastModified><ETag>&quot;f97588c8266a9e34bc423979b9f0b291&quot;</ETag><Size>2757897</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/Novokhrestov_2020_ComputerNetworkThreatModelling.pdf</Key><LastModified>2022-04-12T11:03:29.000Z</LastModified><ETag>&quot;cb15b9765a2a9f7c1052120963e6d3fc&quot;</ETag><Size>611722</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/defence/Qian_2018_OWASPRiskAnalysisDrivenSecurityRequirementsForSecureAndroidMobileSoftware.pdf</Key><LastModified>2022-04-12T11:03:30.000Z</LastModified><ETag>&quot;3ba6c5b2c5cab12525a7ac23143bbad7&quot;</ETag><Size>161296</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/digital-forensics/</Key><LastModified>2023-10-23T09:51:33.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/digital-forensics/ZEIT8028_Lab2_Disk_Forensics.pdf</Key><LastModified>2023-10-23T10:12:57.000Z</LastModified><ETag>&quot;0c22eb591cf64819afe31a5d519d1d08&quot;</ETag><Size>762491</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/digital-forensics/ZEIT8028_Lab3_Registry_Forensics.pdf</Key><LastModified>2023-10-23T10:13:00.000Z</LastModified><ETag>&quot;40dc7ca325cf303bb844e2d825369b67&quot;</ETag><Size>143010</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/digital-forensics/ZEIT8028_Lab4_Network_Forensics.pdf</Key><LastModified>2023-10-23T10:13:02.000Z</LastModified><ETag>&quot;63383d705c4f0b57ab2f5b9f0195ac8c&quot;</ETag><Size>335641</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity/digital-forensics/ZEIT8028_Lab5_Memory_Forensics.pdf</Key><LastModified>2023-10-23T10:13:04.000Z</LastModified><ETag>&quot;27243497514cb6a1ce2254648c8d6629&quot;</ETag><Size>481082</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rand/</Key><LastModified>2023-03-28T07:42:38.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rand/ISO-27001- InformationSecurityManagementSystems-2022-3rd-edition.pdf</Key><LastModified>2023-03-28T07:43:17.000Z</LastModified><ETag>&quot;a4e8d1666a88935aebcbf483d2568787&quot;</ETag><Size>460378</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rand/ISO-27002-InformationSecurityControls-2022-3rd-edition.pdf</Key><LastModified>2023-03-28T07:43:21.000Z</LastModified><ETag>&quot;1e471b567bb537c0dfc6f78a3ded1c13&quot;</ETag><Size>1699217</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rand/ISO-27005-GuidanceManagingInformationSecurityRisks-2022-4th-edition.pdf</Key><LastModified>2023-03-28T07:43:25.000Z</LastModified><ETag>&quot;0a0f84b7a95dc08f5c4f140c5aaecfaa&quot;</ETag><Size>1976624</Size><StorageClass>STANDARD</StorageClass></Contents></ListBucketResult>