<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://smartcitysecurity.net/2023/06/23/move-conference-excel-london-june-21st/</loc><lastmod>2023-06-23T15:42:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2023/06/19/competence-questions-for-a-smart-city-cybersecurity-application-ontology/</loc><lastmod>2023-06-19T10:09:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2023/06/13/competence-questions-for-a-smart-city-domain-ontology/</loc><lastmod>2023-06-13T09:54:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2023/05/31/scope-of-smart-city-domain-ontologies-for-cyber-security/</loc><lastmod>2023-06-04T06:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/stix-2-1-ontology-model-poc-with-stardog-using-knowledge-graphs-and-rdf/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2023/06/stix-extension-ontology.png</image:loc><image:title>stix-extension-ontology</image:title></image:image><lastmod>2023-06-03T18:57:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/vehicle-function-and-traffic-light-digital-twins-security-scenario/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-2.png</image:loc><image:title>Model 2</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-3.png</image:loc><image:title>Model 3</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-4.png</image:loc><image:title>Model 4</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-5.png</image:loc><image:title>Model 5</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-6.png</image:loc><image:title>Model 6</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-7.png</image:loc><image:title>Model 7</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/model-1.png</image:loc><image:title>Model 1</image:title></image:image><lastmod>2023-06-03T16:50:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/digital-twin-models/digital-twin-poc-with-neo4j-and-protege/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2021/01/pexels-photo-325185.jpeg</image:loc><image:title>view of cityscape</image:title><image:caption>Photo by Aleksandar Pasaric on &lt;a href="https://www.pexels.com/photo/view-of-cityscape-325185/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-03T11:29:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/analysis-of-smart-city-digital-twin-and-reference-data/</loc><lastmod>2023-06-03T11:27:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/digital-twin-data-integration-with-neo4j/</loc><lastmod>2023-06-03T11:25:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/model-the-digital-twin-environment/</loc><lastmod>2023-06-03T11:23:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-digital-twin-owl-ontology-design/</loc><lastmod>2023-06-03T11:22:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/aws-iot-things-graph-data-model-tdm-security-use-cases/</loc><lastmod>2023-06-03T11:14:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2023/06/03/how-domain-and-application-ontologies-work-together/</loc><lastmod>2023-06-03T10:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2023/06/02/application-ontology-and-smart-city-cyber-security/</loc><lastmod>2023-06-03T08:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2023/05/31/use-of-domain-ontologies-for-smart-city-cybersecurity/</loc><lastmod>2023-06-02T08:18:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/smart-city-vocabulary/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/pexels-photo-278887.jpeg</image:loc><image:title>alphabet close up communication conceptual</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/alphabet-close-up-communication-conceptual-278887/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-02T07:38:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-scenarios/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/pexels-photo-1904198.jpeg</image:loc><image:title>aerial shot of maze</image:title><image:caption>Photo by Tom Fisk on &lt;a href="https://www.pexels.com/photo/aerial-shot-of-maze-1904198/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-02T07:28:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-objectives/</loc><lastmod>2023-06-02T07:06:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-vectors/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/pexels-photo-808465.jpeg</image:loc><image:title>brown wooden dock surrounded with green grass near mountain under white clouds and blue sky at daytime</image:title><image:caption>Photo by Tyler Lastovich on &lt;a href="https://www.pexels.com/photo/brown-wooden-dock-surrounded-with-green-grass-near-mountain-under-white-clouds-and-blue-sky-at-daytime-808465/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-02T06:41:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-threat-trees/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/pexels-photo-2871478.jpeg</image:loc><image:title>green tree</image:title><image:caption>Photo by Alexander Kovalev on &lt;a href="https://www.pexels.com/photo/green-tree-2871478/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-02T06:18:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-vulnerabilities/</loc><lastmod>2023-06-01T20:08:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-scope/</loc><lastmod>2023-06-01T19:48:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/contact/</loc><lastmod>2023-06-01T18:03:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/mission-overview/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/pexels-photo-164357.jpeg</image:loc><image:title>gray scale of city skyline photography</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/gray-scale-of-city-skyline-photography-164357/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-01T18:00:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/value-assurance/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2020/04/pexels-photo-2397653.jpeg</image:loc><image:title>underwater photography of turtle</image:title><image:caption>Photo by Jeremy Bishop on &lt;a href="https://www.pexels.com/photo/underwater-photography-of-turtle-2397653/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-01T13:40:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/security-research/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2023/06/field-corn-air-frisch-158827.jpeg</image:loc><image:title>corn fields under white clouds with blue sky during daytime</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/corn-fields-under-white-clouds-with-blue-sky-during-daytime-158827/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-01T13:18:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-security-resources/</loc><lastmod>2023-06-01T10:47:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-guides/</loc><lastmod>2023-06-01T10:24:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/cyber-management/</loc><lastmod>2023-06-01T08:12:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/security-controls/</loc><lastmod>2023-06-01T07:41:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-taxonomies/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/networking.png</image:loc><image:title>networking</image:title></image:image><lastmod>2023-06-01T07:35:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2022/09/29/ontology-standards-collaboration-for-smart-cities-and-smart-city-systems/</loc><lastmod>2022-10-08T09:54:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2022/10/08/smart-city-cyber-security-ontology-and-inferencing-proof-of-concept-overview/</loc><lastmod>2022-10-08T09:53:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-threat-landscape/</loc><lastmod>2022-10-08T08:06:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2022/09/30/new-proof-of-concept-poc-with-stardog-and-knowledge-graph-development/</loc><lastmod>2022-09-30T16:46:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2021/09/18/smart-city-reference-architecture/</loc><lastmod>2022-09-30T08:34:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/monitoring-strategies/</loc><lastmod>2021-01-23T20:43:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-cities/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/national-mall.png</image:loc><image:title>national-mall</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/capitol.png</image:loc><image:title>capitol</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/tower-of-london.png</image:loc><image:title>tower-of-london</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/tower-bridge.png</image:loc><image:title>tower-bridge</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/alcala-gate1-e1567021947885.png</image:loc><image:title>alcala-gate(1)</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/marina-bay-sands.png</image:loc><image:title>marina-bay-sands</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/cathedral.png</image:loc><image:title>cathedral</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/saint-basils-cathedral.png</image:loc><image:title>saint-basils-cathedral</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/petronas.png</image:loc><image:title>petronas</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/chichen-itza-e1567021532639.png</image:loc><image:title>chichen-itza</image:title></image:image><lastmod>2021-01-23T20:33:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/about/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/pexels-photo-2341830.jpeg</image:loc><image:title>body of water across bridge during nighttime</image:title><image:caption>Photo by Aleksandar Pasaric on &lt;a href="https://www.pexels.com/photo/body-of-water-across-bridge-during-nighttime-2341830/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-01-23T19:55:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/research/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/citysky.jpg</image:loc><image:title>citysky</image:title></image:image><lastmod>2021-01-23T19:50:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/knowledge-management-charter/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2020/04/pexels-photo-747964.jpeg</image:loc><image:title>person on a bridge near a lake</image:title><image:caption>Photo by Simon Migaj on &lt;a href="https://www.pexels.com/photo/person-on-a-bridge-near-a-lake-747964/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-01-23T08:29:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2021/01/21/digital-twin-proof-of-concept-using-neo4j-and-protege/</loc><lastmod>2021-01-21T18:44:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2021/01/16/azure-digital-twins-for-smart-buildings-willowtwin-solution/</loc><lastmod>2021-01-16T15:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2021/01/15/centre-for-digitally-built-britain-and-digital-twin-hub/</loc><lastmod>2021-01-15T20:54:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/digital-twin-models/</loc><lastmod>2020-12-08T20:45:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2020/11/17/smart-city-expo-day-1/</loc><lastmod>2020-11-17T22:58:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/11/16/smart-city-live-2020-virtual-expo-17-nov/</loc><lastmod>2020-11-16T20:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/11/15/update-and-smart-cities-post-covid19/</loc><lastmod>2020-11-15T16:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/identify/smart-city-asset-management-design-pattern/</loc><lastmod>2020-07-08T19:33:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2020/07/08/cisco-safe-security-reference-architecture/</loc><lastmod>2020-07-08T12:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/05/31/smart-city-strategic-context/</loc><lastmod>2020-05-31T16:43:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/05/25/smart-city-conferences-in-2020/</loc><lastmod>2020-05-27T18:25:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/05/20/recent-attacks-to-city-public-services/</loc><lastmod>2020-05-20T21:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/05/17/zenzic-cyber-resilience-in-connected-and-automated-mobility-cam-report/</loc><lastmod>2020-05-17T18:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/05/12/smart-city-identify-city-environment/</loc><lastmod>2020-05-13T19:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/03/27/smart-city-identify-asset-management/</loc><lastmod>2020-04-25T20:13:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/identify/</loc><lastmod>2020-04-25T20:09:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-cyber-security-framework/</loc><lastmod>2020-04-25T20:06:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2020/04/21/learning-from-an-enterprise-ontology/</loc><lastmod>2020-04-21T20:08:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2020/03/08/cyber-security-framework-for-smart-cities/</loc><lastmod>2020-04-10T11:39:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/10/10/standards-and-best-practice-to-support-smart-city-cyber-security/</loc><lastmod>2020-04-05T20:20:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/10/05/test/</loc><lastmod>2020-04-05T20:15:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/10/02/the-evidence-initiative-and-smart-cities/</loc><lastmod>2020-04-05T20:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/09/26/cyber-security-capabilities-for-a-smart-city-cyber-security-strategy/</loc><lastmod>2020-04-05T20:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/09/17/smart-city-cyber-security-strategy/</loc><lastmod>2020-04-05T20:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/09/08/smart-city-cyber-security-ontology/</loc><lastmod>2020-04-05T19:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/09/06/the-impetus-that-drives-cyber-security/</loc><lastmod>2020-04-05T19:50:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/09/02/cyber-security-capability-for-smart-cities/</loc><lastmod>2020-04-05T19:48:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/31/lessons-to-be-learned-from-recent-attacks-to-cities/</loc><lastmod>2020-04-05T19:45:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/26/smart-cities-and-cybernetics/</loc><lastmod>2020-04-05T19:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/19/management-of-cities/</loc><lastmod>2020-04-05T19:27:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/18/homes-communities-and-cities/</loc><lastmod>2020-04-05T19:24:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/03/data-driven-smart-cities/</loc><lastmod>2020-04-05T19:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/14/recent-cyber-attacks-on-cities/</loc><lastmod>2020-04-05T19:18:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/11/the-house-that-google-built/</loc><lastmod>2020-04-05T19:14:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/09/cities-critical-infrastructure-and-maturity/</loc><lastmod>2020-04-05T19:12:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/07/vulnerabilities-and-soft-targets/</loc><lastmod>2020-04-05T19:06:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/05/who-or-what-is-the-weakest-link/</loc><lastmod>2020-04-05T19:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/04/cyber-security-best-practice-for-smart-cities/</loc><lastmod>2020-04-05T17:22:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/smart-city-classification/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/classification.png</image:loc><image:title>classification</image:title></image:image><lastmod>2020-04-05T16:36:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-ontology/</loc><lastmod>2020-04-05T16:32:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model/</loc><lastmod>2020-04-05T16:28:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-examples/</loc><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/scooter-attack.png</image:loc><image:title>scooter Attack</image:title></image:image><image:image><image:loc>https://smartcitysecurity.net/wp-content/uploads/2019/08/scooter-actor.png</image:loc><image:title>scooter Actor</image:title></image:image><lastmod>2020-04-05T16:24:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-risk-and-impact-analysis/</loc><lastmod>2020-04-05T16:19:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/design-guides/</loc><lastmod>2020-04-04T18:11:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2020/03/15/cyber-security-framework-for-smart-cities-part-2/</loc><lastmod>2020-03-21T11:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/2019/08/25/city-and-home-smart-cameras-eavesdropping-surveillance-and-safety/</loc><lastmod>2019-09-08T13:42:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/home/</loc><lastmod>2019-08-28T19:17:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/research-resources/</loc><lastmod>2019-08-27T21:48:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/2019/08/21/smart-city-lack-of-investment-in-cybersecurity/</loc><lastmod>2019-08-26T09:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://smartcitysecurity.net/smart-city-maturity/</loc><lastmod>2019-08-17T07:09:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-mitigation-tactical/</loc><lastmod>2019-08-13T21:34:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-mitigation-strategy/</loc><lastmod>2019-08-13T21:32:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/smart-city-threat-model-threat-actors/</loc><lastmod>2019-08-13T19:00:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/scooter-attack-model-1-2/</loc><lastmod>2019-08-08T14:50:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net/scooter-attack-model-1/</loc><lastmod>2019-08-08T14:49:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://smartcitysecurity.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-06-23T15:42:34+00:00</lastmod></url></urlset>
